-
Notifications
You must be signed in to change notification settings - Fork 57
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
No Schema for SecretProviderClass manifests #21
Comments
@jpbulloch5 You can use Kubeconform and set the CRDs-catalog as an external schema location. This will work because |
@eyarz Maybe we could link to the CRD catalog in the README |
Sure! I will open a PR. |
Our CI/CD use case pipes the output from |
In the CRDs-catalog repo, you also have instructions on how to use it with |
As a custom solution based on your feedback (thanks), I added the following to the dockerfile for the custom image that runs the RUN mkdir --parents crd-schemas/master-standalone-strict \
&& wget \
--quiet \
--output-document crd-schemas/master-standalone-strict/secretproviderclass-secrets-store-v1alpha1.json \
https://raw.githubusercontent.com/datreeio/CRDs-catalog/main/secrets-store.csi.x-k8s.io/secretproviderclass_v1alpha1.json In the script that executes the job I added |
There are currently no schemas for SecretProviderClass (used in our case for connecting Azure Key Vaults to our Deployments).
Azure Documentation related to our use case:
https://learn.microsoft.com/en-us/azure/aks/csi-secrets-store-driver#sync-mounted-content-with-a-kubernetes-secret
Currently, the lack of a schema for SecretProviderClass manifests means we have to use
--ignore-missing-schemas
in our pipelines when linting our Kubernetes manifests.Thanks!
The text was updated successfully, but these errors were encountered: