Skip to content

Conversation

@subhashish-devtron
Copy link
Contributor

@subhashish-devtron subhashish-devtron commented Jun 8, 2023

Description

Fixes #3493
argo workflow double encoding of secret value in template

How Has This Been Tested?

manually tested for config maps and secrets

Checklist:

  • The title of the PR states what changed and the related issues number (used for the release note).
  • Does this PR requires documentation updates?
  • I've updated documentation as required by this PR.
  • I have performed a self-review of my own code.
  • I have commented my code, particularly in hard-to-understand areas.
  • I have tested it for all user roles.
  • I have added all the required unit/api test cases.

Does this PR introduce a user-facing change?


for key, value := range configMapSecretDto.Data {
secretDataMap[key] = []byte(value)
}

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Please add comment here, why we are doing this

configSecretMap.MountPath = dto.MountPath
jsonRawMsg, err := json.Marshal(dto.Data)

if dto.ConfigType == repository.CS_TYPE_CONFIG {
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Please add comment here, why we are doing that

@sonarqubecloud
Copy link

sonarqubecloud bot commented Jun 8, 2023

Kudos, SonarCloud Quality Gate passed!    Quality Gate passed

Bug A 0 Bugs
Vulnerability A 0 Vulnerabilities
Security Hotspot A 0 Security Hotspots
Code Smell A 0 Code Smells

No Coverage information No Coverage information
0.0% 0.0% Duplication

@subhashish-devtron subhashish-devtron merged commit b439a3a into main Jun 8, 2023
@subhashish-devtron subhashish-devtron deleted the fixArgoCSencode branch June 8, 2023 16:11
gireesh-naidu pushed a commit that referenced this pull request Jun 16, 2023
* fixing cs issue argo executor

* cleaning

* fix

* addressed PRs
adi6859 pushed a commit that referenced this pull request Jun 16, 2023
* fixing cs issue argo executor

* cleaning

* fix

* addressed PRs
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

Bug: Secrets attached on pre/post-cd steps are base64 encoded

3 participants