Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Spec errors seem to be eaten when specs come from a secret #1472

Open
crdant opened this issue Feb 16, 2024 · 1 comment
Open

Spec errors seem to be eaten when specs come from a secret #1472

crdant opened this issue Feb 16, 2024 · 1 comment

Comments

@crdant
Copy link
Member

crdant commented Feb 16, 2024

Bug Description

While working on some specs for a new app we put them into the Helm chart and did some templating to share some of the collectors and analyzers between preflights and support bundles. The templates for the Registry Image collector depended on a tag being set in a Helm value and we did an install where that value wasn't set. In this scenario, the spec became invalid because the registry image was listed as registry/repository/path/to/image: with no tag at the end.

Instead of reporting the error, both the command-line tools and the invocation within the KOTS Admin Console treated the situation as there being no specs available.

Expected Behavior

The expected behavior is that the tooling will identify that a spec is available in the Helm template/in-cluster secret and report that the spec has an error.

Steps To Reproduce

Induce an error into a spec that is included in a Helm chart secret and attempt to invoked the preflight/support bundle from either the CLI or the KOTS admin console. The command-line tools will report there is no spec available, and the Admin Console will either skip preflights or generate a default support bundle.

Additional Context

See slack thread on Replicated Slack if you have access.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants