-
Notifications
You must be signed in to change notification settings - Fork 3
Description
Chart version
jfrog-credential-provider-0.1.0-beta.6 (also reproducible on beta.3~beta.5 if tested)
Environment
EKS: v1.33.x
Auth mode: AWS Cognito OIDC
Install method: Helm (jfrog/jfrog-credential-provider)
What happened
When deploying with aws_auth_method: cognito_oidc, pods in DaemonSet stay in Init:CrashLoopBackOff.
Init container log shows:
Updating the kubelet configuration failed
The rendered ConfigMap jfrog-provider.json is invalid JSON (missing closing ] and } in env/root object).
Expected behavior
Chart should render valid JSON for both assume_role and cognito_oidc branches.
Values used (sanitized)
`providerConfig:
- name: jfrog-credentials-provider
artifactoryUrl: "xxxxx.jfrog.io"
matchImages:- "xxxxx.jfrog.io/*"
defaultCacheDuration: 5h
aws:
enabled: true
aws_auth_method: "cognito_oidc"
secret_name: "xxxxx"
user_pool_name: "xxxxx"
resource_server_name: "xxxxx"
user_pool_resource_scope: "xxxxx"
jfrog_oidc_provider_name: "xxxxx"`
- "xxxxx.jfrog.io/*"
Reproduction steps
Install chart with values above:
helm upgrade --install secret-provider jfrog/jfrog-credential-provider -n jfrog --create-namespace -f aws-cognito-values.yaml --devel
Check pods:
kubectl get pods -n jfrog
Check init logs:
kubectl logs -n jfrog -c jfrog-credential-provider-injector --previous
Inspect configmap:
kubectl get configmap -n jfrog secret-provider-jfrog-credential-provider-config -o yaml
Observe invalid JSON in data.jfrog-provider.json.
Possible root cause
Template templates/configmap-provider.yaml in cognito_oidc branch does not close JSON array/object, while assume_role branch does.