Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add a bit more logging at info level #130

Merged
merged 1 commit into from
May 22, 2023
Merged

Conversation

ruuda
Copy link
Contributor

@ruuda ruuda commented Oct 7, 2022

I was trying to get things to run with the new Kubernetes authentication introduced in #122, but I ran into some issues. This additional logging helped me to diagnose the issue.

It’s a bit ugly to replicate the getOptionsValue oLogLevel (cCliOptions context) <= Info, maybe it makes sense write small function for this.

Off topic: the issue I was facing (writing this down here in case future visitors are facing the same issue). The policy associated with the role did not have permission to read /sys/mounts. Vaultenv did not fail on this when it requested the mounts, but it caused it to make a request to /v1/secret/mypath instead of /v1/secret/data/mypath. The additional logging helps diagnose this. The solution was to add

path "sys/mounts" {
  capabilities = ["read"]
}

to the policy associated with the role in Vault. Possibly Vaultenv could do some validation on the response there, I haven’t looked into it.

@rkrzr rkrzr requested a review from Riscky May 21, 2023 14:24
Copy link
Contributor

@Riscky Riscky left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM

@Riscky
Copy link
Contributor

Riscky commented May 22, 2023

@OpsBotPrime merge

@OpsBotPrime
Copy link
Contributor

Pull request approved for merge by @Riscky, rebasing now.

@OpsBotPrime
Copy link
Contributor

Rebased as 5c48fdf, waiting for CI …

@OpsBotPrime
Copy link
Contributor

CI job 🟡 started.

@Riscky
Copy link
Contributor

Riscky commented May 22, 2023

@OpsBotPrime missed a webhook?

@OpsBotPrime
Copy link
Contributor

The build succeeded.

@Riscky Riscky merged commit 5c48fdf into channable:master May 22, 2023
@ruuda ruuda deleted the log-auth branch July 6, 2023 16:57
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants