Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Encode username and password in Kubernetes secrets #7829

Merged
merged 1 commit into from
Mar 12, 2024

Conversation

abhay-krishna
Copy link
Member

@abhay-krishna abhay-krishna commented Mar 11, 2024

We need to encode the basic auth credentials to base64 when using them in templates to ensure that passwords containing special characters like escape characters and line separators are properly handled, and don't cause errors when unmarshaling or during kubectl apply.

Fixes: #7623

By submitting this pull request, I confirm that you can use, modify, copy, and redistribute this contribution, under the terms of your choice.

@eks-distro-bot eks-distro-bot added the size/L Denotes a PR that changes 100-499 lines, ignoring generated files. label Mar 11, 2024
@abhay-krishna abhay-krishna force-pushed the data-for-secrets branch 3 times, most recently from 603ef88 to a48a068 Compare March 11, 2024 23:16
Copy link

codecov bot commented Mar 11, 2024

Codecov Report

All modified and coverable lines are covered by tests ✅

Project coverage is 73.45%. Comparing base (c394200) to head (2e5628f).

Additional details and impacted files
@@           Coverage Diff           @@
##             main    #7829   +/-   ##
=======================================
  Coverage   73.45%   73.45%           
=======================================
  Files         588      588           
  Lines       37153    37157    +4     
=======================================
+ Hits        27289    27295    +6     
+ Misses       8068     8067    -1     
+ Partials     1796     1795    -1     

☔ View full report in Codecov by Sentry.
📢 Have feedback on the report? Share it here.

@abhay-krishna abhay-krishna force-pushed the data-for-secrets branch 2 times, most recently from 708df07 to 0bd8149 Compare March 12, 2024 01:04
@abhinavmpandey08
Copy link
Member

/approve
/lgtm
/woof

@eks-distro-bot
Copy link
Collaborator

@abhinavmpandey08: dog image

In response to this:

/approve
/lgtm
/woof

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.

@eks-distro-bot
Copy link
Collaborator

[APPROVALNOTIFIER] This PR is APPROVED

This pull-request has been approved by: abhinavmpandey08

The full list of commands accepted by this bot can be found here.

The pull request process is described here

Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@eks-distro-bot eks-distro-bot merged commit 2ceb617 into aws:main Mar 12, 2024
10 checks passed
@abhay-krishna
Copy link
Member Author

/cherrypick release-0.19

@eks-distro-pr-bot
Copy link
Contributor

@abhay-krishna: new pull request created: #7833

In response to this:

/cherrypick release-0.19

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
approved lgtm size/L Denotes a PR that changes 100-499 lines, ignoring generated files.
Projects
None yet
Development

Successfully merging this pull request may close these issues.

Backslashes in Vsphere passwords are interpreted as escape characters in generated YAML
4 participants