-
Notifications
You must be signed in to change notification settings - Fork 177
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
HIP for git based dependencies #321
base: main
Are you sure you want to change the base?
Conversation
Signed-off-by: yxxhero <aiopsclub@163.com> fix typo Signed-off-by: yxxhero <aiopsclub@163.com> Update hip-0015.md Signed-off-by: yxxhero <aiopsclub@163.com> mv hip 0015 to 0016 Signed-off-by: yxxhero <aiopsclub@163.com> Signed-off-by: Dominykas Blyžė <hello@dominykas.com>
Signed-off-by: Dominykas Blyžė <hello@dominykas.com>
Signed-off-by: Dominykas Blyžė <hello@dominykas.com>
Signed-off-by: Dominykas Blyžė <hello@dominykas.com>
8027423
to
3d4984e
Compare
See helm/community#321 Signed-off-by: Dominykas Blyžė <hello@dominykas.com>
See helm/community#321 Signed-off-by: Dominykas Blyžė <hello@dominykas.com>
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Overall, git protocol support for chart dependencies seems like a good idea to me. I think it for the most part would be helpful for Chart develop UX. I put mostly questions about the details.
The only non-detail concern I think is how user's would need to manage dependencies for testing vs non-testing use-cases.
hips/hip-00NN.md
Outdated
``` | ||
dependencies: | ||
- name: "<dependency name>" | ||
repository: "<protocol>://[<user>[:<password>]@]<hostname>[:<port>][:][/]<path>" |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I wonder if we should allow (read: explicitly disallow) username / password in Chart.yaml
dependency URL? Charts are generally intended for distribution, and credentials in things intended for distribution isn't great. Helm might want to proactively protect users here.
If we decide to allow. I think a lint rule would be desired.
Generally, the git-credential process (as invoked by git clone
) I think would be the preferred method for git to gain access to credentials I think.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I'll admit I just copy/pasted this from npm
documentation.
I agree that it should be removed: 888817f
That said, I think it would just work, because whatever works for git clone
should work in repository
. Do you think it should be explicitly validated and forbidden, or is leaving it undocumented enough?
The implementation code which documents the usage does recommend using a credentials helper: https://github.com/dominykas/helm/blob/e4b4b5e1811af0e18f28a7e4efe3f4b01ebebf59/cmd/helm/dependency.go#L96-L101 (very early wip).
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I'll admit I just copy/pasted this from npm documentation.
😆
I think we should decide to do one of:
- explicitly disallow (via validation in Helm; I think the validation would be trivial to implemt:
u := url.Parse() + u.User().Password() == ""
) - not document, and have a lint rule to warn the user they are potentially including sensitive credentials
HIP IMHO should document/detail which decision we decide
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Added a note to explicitly forbid u/p in the implementation: 7b4771b - it is indeed easier to relax constraints down the road, based on user feedback.
hips/hip-00NN.md
Outdated
version: "<commit-ish>" | ||
``` | ||
where: | ||
- `<protocol>` is one of `git`, `git+ssh`, `git+http`, `git+https`, or `git+file`. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I wonder if we could generally specify git[+<subprotocol>]://
should be handled by git? Rather than explicitly listing the above set of protocols?
I don't think an explicit list is necessary bad. It's not like new transports will be added often. But similarly curious if that could/should be avoided.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Reworded to take git[+<subprotocol>]
into account, but still listing the protocols that git supports as an example. I figure the rest should really be tackled via documentation? Added a note under "How to teach this": 0f6cd2f
When Helm is installing a dependency from git, it should: | ||
|
||
- create a temporary directory | ||
- clone the repo at the specified branch/tag into the temp dir |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I presume, this will executable mean executing git
as a subprocess? Which does also mean git chart dependencies will presume/require the existence of a working git installation.
I think worth calling this out explicitly (beyond the mention in the "security implications" section). While it might be kinda obvious, it is also an important detail of course.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This will be included in the CLI docs, and should be mentioned in the website docs - is it worth mentioning this explicitly in the HIP itself?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I think worth calling out in the HIP. That Helm will require a working git
installation to invoke (via subprocess) in order for a Helm to utilize a charts git
dependencies without error.
And that last part is also kinda important I guess. A non-functional/missing git installation would cause Helm to error (plenty of folk use contaieners, with minimal dependencies ie. no git installed. And often without git credentials). The HIP IMHO should detail that Helm would need to error in this case.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Added the note: 4fc29f1
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
nice, thanks
|
||
## Rejected ideas | ||
|
||
- An [earlier draft for solving the issue](https://github.com/helm/community/pull/214) suggested using URLs like `git://https://...`. There were comments about that approach in the reference implementations, with the suggestion to use the conventions which are already established in other ecosystems. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
agree, the established convention (as mentioned appears to be e.g git+https://...
|
||
When Helm is installing a dependency from git, it should: | ||
|
||
- create a temporary directory |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Is this the process that other similar systems follow? (go modules, npm, pipenv, etc. And the mentioned plugins?) In that, we should probably copy prior-art here. Rather than re-discovering already solved problems?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I know for certain that npm
uses a temporary folder for git clone
during the npm install
process (but it also has other special behaviors around git based deps, that are not applicable to Helm).
I checked the ~/go/pkg
folder and it does not seem to have the .git
folders there, so at least that implies that some sort of an intermediate method must have been used to perform the cloning?
A quick scan of pipenv code also implies a temp folder: https://github.com/pypa/pipenv/blob/da751e1f5568c72e013af9d977ad54c26e924d0e/pipenv/utils/dependencies.py#L749 (although they also have a special behavior for git+file
which might be interesting to learn from).
If the question is about the overall approach - I think at least npm
follows a very similar approach, from what I've seen - the end result after cloning does go through their npm pack
(I think) process, because the final output in the node_modules
folder looks the same way as if it had been npm publish
ed to the registry.
I'm not familiar enough with the process and the implementation on the Helm side just yet, but it might make sense to do a helm package
instead of treating it as if it's a file://
dependency - not sure about any additional steps it performs. It seems the original implementation PR does it's own tarball build, not sure why just yet - still reviewing it.
When Helm is installing a dependency from git, it should: | ||
|
||
- create a temporary directory | ||
- clone the repo at the specified branch/tag into the temp dir |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
We probably should also do git clone --branch <version> --depth=1
? (or whatever the best options for a minimal as possible clone are). But see note about copying prior-art :).
Additionally, submodules come to mind. If the target git repository uses submodules, should these be supported? (how?)
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Can the submodules be left out of the initial implementation? If anything - that would make the initial delivery faster.
Good point on shallow cloning. Added a note: 0f6cd2f
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Can the submodules be left out of the initial implementation?
IMHO sure (as long as it is documented). I guess 99%+ of use cases would be satisfied without submodules, so implementation/support could happily be deferred.
|
||
There are existing ways to achieve installation of charts without using a registry, however they are not very user-friendly and require additional tooling. | ||
|
||
- A Helm chart repository is effectively an `index.yaml` with links to downloads. Maintaining such a repository does create a burden of scripts and automation (e.g. Github Actions). This is not always feasible for smaller projects. It also does not really offer an obvious and readily available way of testing pre-releases. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Note: OCI support does alleviate some of these issues with needing to maintain a chart repository. But doesn't really help for e.g the "testing" use case below.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Indeed, and Github itself supports OCI (although I haven't tried publishing charts into it...) - it would be great if there was a shared workflow or a standardized Github action to publish Helm charts for maintainers to use...
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
or a standardized Github action to publish Helm charts for maintainers to use
Good point. I will double check nothing exists, and add an issue on Helm if not.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
https://github.com/appany/helm-oci-chart-releaser/tree/main -- there does appear to be at least this (community based) action
|
||
## Specification | ||
|
||
The `Chart.yaml` should support the following format for `dependencies`: |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
One curiosity I think we need to think about. Is for the "testing" use case, a user might want to refer to a git repository as a dependency. But they probably want to refer to a registry/OCI repository for non-testing.
The workflow of manually updating dependencies post-testing is possible of course. But it can be awkward. UX could be improved later too of course.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
We've definitely experienced this problem when using npm
. In the end, we wrote tooling which does the dependency overrides in CI (via params and conventions), so that we don't have to commit things like this into git, as well as validators to fail release builds in case they find git based dependencies.
Would it make sense to print a warning during helm dep build
/ helm dep up
? I don't think it's done for the file://
based ones, although the use cases are probably different.
helm package
could also pay attention to that and require a flag, although I'm not sure if the current implementation even validates what's under chart/*
before doing the work? I just deleted a file inside the tgz
under charts
and it didn't flinch.
The "How to teach this" section does mention that the docs should explicitly recommend registries over git - probably a place for some notes there?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Would it make sense to print a warning during helm dep build / helm dep up?
I think this is more of a lint scenario. But curious to what others thoughts might be...
To me, it is not explicit that a git dependency can not be used for production. But that you probably should not (especially not a mutable reference).
OTOH, we could decide to be cautious I think. e.g. helm push/package
could refuse to publish a chart with a git dependency. And then folk can argue if that should be relaxed. Once we allow something, the horse has bolted, and we can't rescind that behavior (even if we later think it is a terrible idea).
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I agree that a linting rule should print a warning - adding that to the HIP: c16a922
I'm unconvinced about failing to package/push. I can see how a warning could be useful, but having to use a flag to publish might break people's CI scenarios? Is there an established way to solicit more feedback on this?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I'm unconvinced about failing to package/push. I can see how a warning could be useful, but having to use a flag to publish might break people's CI scenarios?
My sole thought is that it is easy to be cautious initially, and error on publish/push with git dependencies. Then upon feedback/later review open that publishing/pushing with git dependencies. If Helm initially does the reverse: and allows publishing with git dependencies, then removing that functionality later isn't easily possible (it is a "one-way door").
Is there an established way to solicit more feedback on this?
Lets see what other reviewers of this HIP think. The above for me is an option, not a requirement.
|
||
- create a temporary directory | ||
- clone the repo at the specified branch/tag into the temp dir | ||
- treat the cloned git repo similar to a `file:///path/to/temp/dir` style requirement; use `chart.LoadDir` to load that directory (which in turn applied the logic for filtering the files through `.helmignore`) and archives it to `charts/` |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
We should double check the packaging behavior will work correctly here. Helm in places assumes (iirc) that charts with the same (semver) version, represent the same artifact. Probably charts fetched from a git branch will have changes, but retain the same semver version. And this assumption would be invalid.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Do you have any clues for specifics? Happy to go look, but the code base has the string "version" in a lot of places and a quick scan did not bring results 😅
I can see it maybe might make a difference for deployment/rollback, but that's probably not applicable when used as a dependency?
It would also have to include the registry for comparison, would it not? There's also the checksum in the lock file to validate sameness? And probably the same issue would apply to file://
dependencies already? 🤔
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Let me investigate, and update with some links.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
(still need to look here)
While we may or may not explicitly forbid this format, it is probably a good idea to not officially document it, so as to avoid the proliferation bad practices and accidental leakage of secrets. Signed-off-by: Dominykas Blyžė <hello@dominykas.com>
5152d09
to
a7d6196
Compare
As the protocols are handled by git, it's probably better to define them as something that's supported by `git clone`. Signed-off-by: Dominykas Blyžė <hello@dominykas.com>
a7d6196
to
0f6cd2f
Compare
Signed-off-by: Dominykas Blyžė <hello@dominykas.com>
Signed-off-by: Dominykas Blyžė <hello@dominykas.com>
Signed-off-by: Dominykas Blyžė <hello@dominykas.com>
Signed-off-by: Dominykas Blyžė <hello@dominykas.com>
I'm also now thinking about sub-dependencies... Should there be any behaviors prescribed if a dependency is installed from a registry, but it contains a sub-dependency which was originally installed from git? On There's also the case of git-based dependencies having sub-dependencies (some of which may also be from git?) - meaning that we probably need to do a recursive |
See helm/community#321 Signed-off-by: Dominykas Blyžė <hello@dominykas.com>
See helm/community#321 Signed-off-by: Dominykas Blyžė <hello@dominykas.com>
See helm/community#321 Signed-off-by: Dominykas Blyžė <hello@dominykas.com>
See helm/community#321 Signed-off-by: Dominykas Blyžė <hello@dominykas.com>
See helm/community#321 Signed-off-by: Dominykas Blyžė <hello@dominykas.com>
See helm/community#321 Signed-off-by: Dominykas Blyžė <hello@dominykas.com>
See helm/community#321 Signed-off-by: Dominykas Blyžė <hello@dominykas.com>
See helm/community#321 Signed-off-by: Dominykas Blyžė <hello@dominykas.com>
This is to minimize the risk of credential leaks, see discussion: helm/community#321 (comment) Signed-off-by: Dominykas Blyžė <hello@dominykas.com>
hips/hip-00NN.md
Outdated
``` | ||
dependencies: | ||
- name: "<dependency name>" | ||
repository: "git[+<subprotocol>]://<hostname>[:<port>][:][/]<path>" |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Just realized, that the <path>
here is really just the repository path - it is not the sub-path for the folder inside the repository (something that's been requested in some PR reviews as a feature).
There doesn't seem to be a common pattern established:
- npm does not support sub-paths (monorepos) at all
- pip supports
git+https://github.com/org/repo.git#subdirectory=pkg_dir
: https://pip.pypa.io/en/stable/topics/vcs-support/#url-fragments - ruby supports an extra
glob
property: https://bundler.io/guides/git.html
I kind of like pip's approach - url fragments are a good way to go, although npm would not be able to implement that (should they chose to add support), because they use the url fragment to point to the git branch/tag, i.e. there's going to be discrepancies across ecosystems, so there's no obvious choice here.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Proposing to go ahead with pip approach: b61033b
Draft implementation is really simple: dominykas/helm@0c5734e
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Proposing to go ahead with pip approach: b61033b
seems good to be at a glance
Signed-off-by: Dominykas Blyžė <hello@dominykas.com>
|
||
Charts that start using the new format will effectively be changing their minimum required Helm version, i.e. they would be introducing breaking changes and should bump their major version. | ||
|
||
## Security implications |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
git allows symlinks that can point to anywhere. Helm resolves symlinks and packages up the file contents with a printed warning. Is that an additional security risk?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
That seems like a risk to me. Ideally Helm already might not package symlinks (I didn't check)
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Helm does support resolving symlinks during helm package
: helm/helm#8540 - seems that will be done by design, and it should print a warning.
So does helm template .
.
However the symlinks are ignored if they exist inside the tarball itself (i.e. if you craft the tarball manually, and include a symlink, then it will not be followed) - I hope that's by design too 😁
I've switched the code in the implementation to effectively use the same code path as helm package
(primarily to make sure that if you're installing a chart from git, it would be have as close as possible to it have been helm package
d and published into a registry). This means that symlinks get followed and resolved during helm dep up
, but you do get a warning:
walk.go:74: found symbolic link in path: /var/folders/j3/8m3y8q4176118dng0hvdqfh00000gp/T/helm-git-3323594338/templates/secret.yaml resolves to /Users/Dominykas_Blyze/devel/experiments/helm-test/templates/secret.yaml. Contents of linked file included and used
Given that helm package
's warning was deemed to be enough - I figure this is also enough? I will add an explicit note under "security implications" to explain this - and possibly that should be left at that?
See helm/community#321 Signed-off-by: Dominykas Blyžė <hello@dominykas.com>
See helm/community#321 Signed-off-by: Dominykas Blyžė <hello@dominykas.com>
This is to minimize the risk of credential leaks, see discussion: helm/community#321 (comment) Signed-off-by: Dominykas Blyžė <hello@dominykas.com>
This is an attempt to revive #214, hopefully leading to a revival of helm/helm#11258 down the road.
VCS+protocol
) as npm and Python (this was requested in earlier reviews)I updated the dependency repository URL to allow sub-folders (this was also requested in earlier reviews)(still to be done)There are some things I don't know yet, but I hope these can be resolved during the review process here:
version
not being semverversion
not necessarily matching theversion
in theChart.yaml
of the dependencycc @No9 - you asked for it ;) thanks for your help!