-
-
Notifications
You must be signed in to change notification settings - Fork 153
Add missing key 'secret' to logstream-job helm template. #1434
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add missing key 'secret' to logstream-job helm template. #1434
Conversation
WalkthroughAdjusted Helm template for logstream job to iterate over .Values.parseable.s3ModeSecret.secrets instead of .Values.parseable.s3ModeSecret in the non-local branch. The inner loop over each secret’s keys and environment variable construction remains unchanged. Changes
Sequence Diagram(s)sequenceDiagram
autonumber
actor User
participant Helm as Helm CLI
participant Chart as parseable Helm Chart
participant Tpl as logstream-job.yaml
participant Values as .Values.parseable.s3ModeSecret.secrets
participant K8s as Kubernetes
User->>Helm: helm install/upgrade with values
Helm->>Chart: Render templates
Chart->>Tpl: Process non-local branch
Tpl->>Values: range over secrets[]
loop For each secret in secrets[]
Tpl->>Tpl: range over secret.keys
Tpl->>Tpl: emit env vars from key/value
end
Tpl->>Helm: Rendered Job manifest
Helm->>K8s: Apply manifest
K8s-->>User: Job created/updated
note over Tpl,Values: Changed data source: s3ModeSecret.secrets
Estimated code review effort🎯 2 (Simple) | ⏱️ ~10 minutes Poem
✨ Finishing touches🧪 Generate unit tests
📜 Recent review detailsConfiguration used: CodeRabbit UI Review profile: CHILL Plan: Pro 📒 Files selected for processing (1)
🔇 Additional comments (1)
Tip 👮 Agentic pre-merge checks are now available in preview!Pro plan users can now enable pre-merge checks in their settings to enforce checklists before merging PRs.
Please see the documentation for more information. Example: reviews:
pre_merge_checks:
custom_checks:
- name: "Undocumented Breaking Changes"
mode: "warning"
instructions: |
Pass/fail criteria: All breaking changes to public APIs, CLI flags, environment variables, configuration keys, database schemas, or HTTP/GraphQL endpoints must be documented in the "Breaking Change" section of the PR description and in CHANGELOG.md. Exclude purely internal or private changes (e.g., code not exported from package entry points or explicitly marked as internal). Please share your feedback with us on this Discord post. Thanks for using CodeRabbit! It's free for OSS, and your support helps us grow. If you like it, consider giving us a shout-out. Comment Pre-merge checks✅ Passed checks (5 passed)
|
CLA Assistant Lite bot All contributors have signed the CLA ✍️ ✅ |
I have read the CLA Document and I hereby sign the CLA |
Thanks for the PR @lodinis we'll take a look and merge this today. |
Fixes #1433.
Description
Enabling logstream currently triggers the logstream-job template, but it incorrectly iterates over .Values.parseable.s3ModeSecret instead of .Values.parseable.s3ModeSecret.secrets.
This causes the template to fail when trying to access keys because they are nested under the secrets key.
The fix updates the helm/templates/logstream-job.yaml file to correctly iterate over .Values.parseable.s3ModeSecret.secrets.
Summary by CodeRabbit