You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
And the output should indicate which deployment or the container (whatever is more comfy) is referring to an unknown secret/config-map.
Currently there's no output of this, I do have a draft in a fork I can contribute to. I'm missing some tests but it sort-of works (golang is not my native speak):
Description of the problem/feature request
A check to detect containers referring to configmaps/secret keys that do not exist in the current release via
valueFrom
(v1.EnvVarSource
)Description of the existing behavior vs. expected behavior
In some of our workloads we have containers with environment variables defined as:
But it has happened a couple of times that a typo in the
key
slips and we notice it at the very last moment when the helm release fails to complete.Additional context
The minimum reproduceable manifest could be something like:
And the output should indicate which deployment or the container (whatever is more comfy) is referring to an unknown secret/config-map.
Currently there's no output of this, I do have a draft in a fork I can contribute to. I'm missing some tests but it sort-of works (golang is not my native speak):
main...josegomezr:kube-linter:env_source_check
The text was updated successfully, but these errors were encountered: