-
Notifications
You must be signed in to change notification settings - Fork 554
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Should not pass in mount option of awscredsuri #755
Should not pass in mount option of awscredsuri #755
Conversation
/lgtm |
@wangnyue: changing LGTM is restricted to collaborators In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
bd0769e
to
46686c1
Compare
pkg/driver/node.go
Outdated
if f == "awscredsuri" { | ||
klog.Warning("awscredsuri is not accepted as a efs-csi-driver mount option") | ||
return nil, status.Errorf(codes.InvalidArgument, | ||
"Should not pass in awscredsuri as a mount option") |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
nit: align
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: Ashley-wenyizha, wangnyue, yinsihaws The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
/re-test |
After running |
46686c1
to
cc8b6cf
Compare
failed test was able to be fixed updating Go to latest version and run |
@@ -165,6 +165,12 @@ func (d *Driver) NodePublishVolume(ctx context.Context, req *csi.NodePublishVolu | |||
} | |||
} | |||
|
|||
if f == "awscredsuri" { |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
- I would suggest to have a non supported options list, and check whether that option is in that list
- If that option is not supported, I think we should fail gracefully by just ignore that option + warn log, instead of returning an error. If we do want an exception here, I would recommend we update document somewhere and tell customer the option is not supported by csi-driver.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
thanks, logged this behavior, return nil but do not fail
Updated this behavior in ReadMe
Added on above comment:
|
d2487b4
to
0953a84
Compare
/lgtm |
0953a84
to
41294ee
Compare
41294ee
to
c32eaf8
Compare
/re-test |
/retest |
the volume from a pod. | ||
|
||
- `awscredsuri` mount option is not supported through efs-csi-driver due to security concerns. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Not due to security concerns, it is due to this option is designed and used by ECS tasks.
pkg/driver/node.go
Outdated
@@ -165,6 +165,11 @@ func (d *Driver) NodePublishVolume(ctx context.Context, req *csi.NodePublishVolu | |||
} | |||
} | |||
|
|||
if f == "awscredsuri" { | |||
klog.Warning("awscredsuri is not accepted as a efs-csi-driver mount option") |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
awscredsuri mount option is not supported by efs-csi-driver.
Log this behavior, return nil but do not fail
c32eaf8
to
019e772
Compare
/lgtm |
Is this a bug fix or adding new feature?
Should not pass in mount option of
awscredsuri
as there is no EKS customer should be using it, the uri is used together with ECS metadata endpoint. We should ignore that option if customer passed it in efs-csi-driver.What is this PR about? / Why do we need it?
What testing is done?