Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

feat/fix(falco): adding imagePullSecrets at the service account level #811

Closed
wants to merge 2 commits into from

Conversation

megalucio
Copy link

@megalucio megalucio commented Jan 14, 2025

What type of PR is this?

Uncomment one (or more) /kind <> lines:

/kind bug

/kind cleanup

/kind design

/kind documentation

/kind failing-test

/kind feature

If this PR will release a new chart version please make sure to also uncomment the following line:

kind chart-release

Any specific area of the project related to this PR?

Uncomment one (or more) /area <> lines:

/area falco-chart

/area falco-exporter-chart

/area falcosidekick-chart

/area falco-talon-chart

/area event-generator-chart

/area k8s-metacollector-chart

What this PR does / why we need it:
This pull request includes updates to the Falco Helm Chart to fix and enhance the handling of imagePullSecrets. The changes include modifications to the values.yaml, serviceaccount.yaml, README.md, Chart.yaml, and CHANGELOG.md files.

Key changes:

Enhancements and fixes:

Documentation updates:

Version bump:

For most use cases, it is recommended to specify imagePullSecrets at the ServiceAccount level if all pods using that ServiceAccount need access to the same image pull secrets. This approach simplifies management and ensures consistency across your deployments.

Which issue(s) this PR fixes:

Potentiall Fixes # #673

Special notes for your reviewer:

I've already fixed the corrisponding labels in GitHub

Checklist

  • Chart Version bumped
  • Variables are documented in the README.md
  • CHANGELOG.md updated

Signed-off-by: Ignacio Íñigo <megalucio@users.noreply.github.com>
@poiana
Copy link
Contributor

poiana commented Jan 14, 2025

[APPROVALNOTIFIER] This PR is NOT APPROVED

This pull-request has been approved by: megalucio
Once this PR has been reviewed and has the lgtm label, please assign leogr for approval. For more information see the Kubernetes Code Review Process.

The full list of commands accepted by this bot can be found here.

Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@poiana poiana added kind/feature New feature or request area/falco-chart labels Jan 14, 2025
@poiana poiana requested review from alacuku and bencer January 14, 2025 14:32
@poiana poiana added the size/S label Jan 14, 2025
@megalucio megalucio marked this pull request as ready for review January 14, 2025 14:33
@poiana poiana requested a review from Issif January 14, 2025 14:33
charts/falco/values.yaml Outdated Show resolved Hide resolved
@leogr
Copy link
Member

leogr commented Jan 17, 2025

@megalucio May I ask you to rebase this PR, please?

In particular, pay attention to using the correct rebasing procedure (to avoid merge commits): https://github.com/falcosecurity/.github/blob/main/CONTRIBUTING.md#resolving-conflicts-by-rebasing

If you are unsure or need any help, please don't hesitate to let me know.

Thanks in advance 🙏

Copy link
Member

@alacuku alacuku left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Is there a specific use case that the current solution does not support? The chart sets the imagePullSecrets at the pod level, why do we need to add it to the service account?

@megalucio
Copy link
Author

Is there a specific use case that the current solution does not support? The chart sets the imagePullSecrets at the pod level, why do we need to add it to the service account?

Yes, in order to support this: https://kubernetes.io/docs/tasks/configure-pod-container/configure-service-account/#add-imagepullsecrets-to-a-service-account.

As far as I understand for most use cases, it is recommended to specify imagePullSecrets at the ServiceAccount level if all pods using that ServiceAccount need access to the same image pull secrets. This approach simplifies management and ensures consistency across deployments.

This changes will make sure we support both cases.

@poiana
Copy link
Contributor

poiana commented Jan 30, 2025

Thanks for your pull request. Before we can look at it, you'll need to add a 'DCO signoff' to your commits.

📝 Please follow instructions in the contributing guide to update your commits with the DCO

Full details of the Developer Certificate of Origin can be found at developercertificate.org.

The list of commits missing DCO signoff:

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. I understand the commands that are listed here.

@megalucio megalucio changed the title feat/fix(falco): fixing imagePullSecrets(should be an object) + adding it at the SA level feat/fix(falco): adding imagePullSecrets at the service account level Jan 30, 2025
@megalucio megalucio closed this Jan 30, 2025
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
Status: Done
Development

Successfully merging this pull request may close these issues.

4 participants