-
Notifications
You must be signed in to change notification settings - Fork 289
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add support for cfg via env vars and define external volumes #601
Conversation
Is there an issue to track docs changes? |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Works well 👍 Just one minor comment
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I'm just looking at the Helm chart. Apart from the comment about extraEnv
and few minor ones, rest chart changes look good!
e8a83f5
to
10b8f46
Compare
Hi @bhavin192! Thanks for the review 👍 Here is the commit with applied changes: 32cb93c Currently, I'm working on a document as mentioned in #601 (comment). EDIT: PR for docs is ready: kubeshop/botkube-docs#82 Regarding README.md for Helm Chart, it would be nice to have it automatically generated, e.g. via helm-docs, or readme-generator-for-helm. For now, I described only properties that I added on this PR. However, I spot that the table is not complete and also contains removed properties too, e.g. I created an issue to track that: #609 |
Docs changes are handled in the same issue, here is the related PR: kubeshop/botkube-docs#82 Here is also a recording that shows how it works: https://www.loom.com/share/37f6a60f88194b55916ee256a534336c |
@mszostok could you please resolve the conflicts? |
bb53584
to
05b231e
Compare
##### ISSUE TYPE - Feature Pull Request ##### SUMMARY Add an option to push the BotKube image automatically on PR. It's alternative approach for #604. This PR will solve the problem with manual PR builds, e.g. we had that issue here: - #601 - #593 - #582 - #583 Example run: https://github.com/mszostok/botkube/runs/6714112689?check_suite_focus=true Fixes #590 To ensure that secrets won't be available for untrusted code, first we need to build the image and share it with the second job, which doesn't check out the untrusted code and can safely push an artifact to ghcr.io. The flow is as follows: ``` Job1: image build -> image save -> artifact upload Job2: artifact download -> image load -> image push ``` Job1—runs untrusted code but without write repo perms Job2—push built image with package write perms #### Security This article describes it well: https://securitylab.github.com/research/github-actions-preventing-pwn-requests/
ISSUE TYPE
SUMMARY
extraEnv
extraVolumeMounts
extraVolumes
Fixes #480
Related documentation: kubeshop/botkube-docs#82
TESTING
Unit test proves that the reading configuration works as expected. However, below you will find an e2e tutorial.
BotKube with Vault via CSI driver
Create K8s cluster, e.g. k3s via
lima-vm
:limactl start template://k3s
Install Vault:
Set Slack token:
kubectl exec -it vault-0 -- /bin/sh
Configure Kubernetes authentication:
Install the secrets store CSI driver:
Create install parameters:
Checkout this PR:
gh pr checkout 601
Install BotKube: