-
Notifications
You must be signed in to change notification settings - Fork 176
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
FluxCD helm release fails when using ocirepo resource as chart reference #3435
Comments
Thanks for the detailed issue with repro steps! The easiest fix in the meantime would be to use a digest in your OCI repo instead of a tag, this will prevent the agent from doing any mutation. ref:
digest: d1700931bc7a4de82790ea7e275eca861259bc71b4bca53f52cfa35e3ef8800d Still, the fact that though OCI repo mutation doesn't work with Helm chart objects is definitely a bug and should be fixed. I'm not sure we'll want to solve the way #3436 does as generally we want to encourage sha's and keep the agent simple. Perhaps we should disable the CRC32 hash all together for the OCI repo and live with collisions as the trade off. Will need to put more thought into it |
So this does seem to be a problem that only really relates to helm, as using a fluxcd artifact works fine with the crc32 mutation. I was thinking that a possible way to address the issue would be to check registry manifest, but that requires reaching out to the registry and what not... so using the annotations was the "simplest" MVP (minimal viable product). And I understanding not waiting to do the direction I did in the PR, I will leave it open for now |
Yeah getting the mediatype of the image from the registry and avoiding mutation for Helm images could technically work. The agent would have to reach out to the cluster to get auth for the registry. Not ideal, but not impossible. I think this would be a good issue to bring up at the next community meeting if you can make it. They are Wednesdays at 1PM EST. Next is Feb 5th |
Sure, I will do my best to attend, I can not attend the one on the Jan 29th due to a prior commitment. |
Environment
App version:
v0.47.0
Kubernetes distro being used:
kind
,rke2
Steps to reproduce
Additional Context
sectionExpected result
The
helm-controller
installs the0.13.0
version of theexternal-secrets
helm-releaseActual Result
Helm throws a version mismatch error because of the
-zarf-
and crc32 checksumVisual Proof (screenshots, videos, text, etc)
Resolution
I think that
zarf
should allow the ability to remove the crc32 checksum from resources when a certain annotation is provided:zarf.dev/remove-checksum
Additional Context
kustomization.yml
helm-release.yml
namespace.yml
oci-repo.yml
values.yaml
zarf.yaml
The text was updated successfully, but these errors were encountered: