jedcunningham commented on code in PR #61936:
URL: https://github.com/apache/airflow/pull/61936#discussion_r2855678618


##########
providers/cncf/kubernetes/src/airflow/providers/cncf/kubernetes/hooks/kubernetes.py:
##########
@@ -56,6 +60,11 @@
     from kubernetes.client.models import CoreV1Event, CoreV1EventList, V1Job, 
V1Pod
 
 LOADING_KUBE_CONFIG_FILE_RESOURCE = "Loading Kubernetes configuration file 
kube_config from {}..."
+_AWS_EXEC_AUTH_VERSION_CHECK_MODE_FIELD = 
"exec_auth_aws_cli_version_check_mode"
+_AWS_EXEC_AUTH_VERSION_CHECK_MODES = {"warn", "fail", "ignore"}
+_AWS_EXEC_AUTH_AWS_BINARY_NAMES = {"aws", "aws.exe", "aws2", "aws2.exe"}
+_AWS_EXEC_AUTH_FIXED_BOTOCORE_VERSION = (1, 40, 2)
+_BOTOCORE_VERSION_PATTERN = 
re.compile(r"botocore/(?P<version>\d+(?:\.\d+){1,2})")

Review Comment:
   I'm pretty hesitant to add this much code to add a min version check like 
this, especially one that isn't really directly related to this provider.
   
   The [lower bound in the amazon 
provider](https://github.com/apache/airflow/blob/6d6f8bf3d04fc3ee90a3dfd6f5c1e980dabb549a/providers/amazon/pyproject.toml#L69)
 is already higher than what we'd defend against here. And, our constraint 
files are already putting in a higher version. (2.11.1 has the new version, 
2.11.0 did not, fwiw)
   
   If we went with the proposed generic validator + validate botocore version 
in the aws provider, we'd not have a problem because of the min version over 
there (ignoring _when_ that min was bumped over there).
   
   I'm just wondering if this is now not really a likely issue with the latest 
versions of stuff already...



-- 
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.

To unsubscribe, e-mail: [email protected]

For queries about this service, please contact Infrastructure at:
[email protected]

Reply via email to