-
Notifications
You must be signed in to change notification settings - Fork 200
Fix unwritable .aws directory #484
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: main
Are you sure you want to change the base?
Conversation
Signed-off-by: Derek Gurchik <602444+gurchik@users.noreply.github.com>
|
Hi @gurchik, thank you for the PR. I'll try to take a look at it during the weekend. |
|
@GMartinez-Sisti any update on this? :) I will bump the chart version once it's reviewed |
Signed-off-by: Gabriel Martinez <19713226+GMartinez-Sisti@users.noreply.github.com>
|
Blocked by helm-unittest -> helm-unittest/helm-unittest#790 (comment). |
|
@GMartinez-Sisti the checksum fails because your CI workflow hardcodes expected SHA sums that don't match what the maintainer uploaded for the helm-unittest release here. I understand that the hardcoded SHA sums used to match until the helm-unittest maintainer replaced the release artifacts. I don't know why they replaced the artifacts, but I don't think their release workflow creates reproducible builds. Therefore, I find it unlikely the maintainer will be able to get the release to match the previous checksum now that it has been changed. If you are concerned about a potential supply chain attack then feel free to continue to investigate, if not then I would recommend updating your hardcoded checksums with the new values. |
Right, we need confirmation from the maintainer that this is intended and have the checksum file updated or get a new release. This forced update goes against the best practices for released software, an artifact should never change, a new release should be published instead. |
Signed-off-by: Derek Gurchik <602444+gurchik@users.noreply.github.com>
what
Mounts the AWS
credentialsandconfigsecrets as individual files within a writable.awsdirectory, rather than mounting them in a read-only directory.This PR has no effect if someone mounts an arbitrary AWS secret using
.Values.awsSecretNamebecause when doing that there is no way for the Chart to know the contents of the secret so it can't know which files to mount. So in this case there is no change of behavior.why
The AWS CLI cannot work properly when the
.awsdirectory is read-only. This is a problem since this tool is often needed in Terraform projects. For example, a common way to configure the Helm Terraform provider is to pass in anexecargument which executes the AWS CLI to get Kubernetes credentials. Without this change, that would be impossible as the AWS CLI would error.tests
I tested my changes by deploying this to my cluster which was previously deploying version 5.18.1 of this Helm Chart.
Values:
Before this change:
After this change:
references
closes #380
resolves dupe #421