-
Notifications
You must be signed in to change notification settings - Fork 29
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
fix get latest version #63
fix get latest version #63
Conversation
I tested the script and it still tries to download the broken version
|
d81b0f7
to
0e9caab
Compare
Fixed |
Do you have any issue to this fix? |
Given the lack of binaries in some releases, e.g. see kubernetes-sigs/aws-iam-authenticator#657, adding a fallback of finding a previous version in the case that a explicit version hasn't been pinned might be behaviour that is preferred to failing when the latest release has no binary. Ofc an even nicer approach is to have an approved list of versions pulled, we select the latest version there and use that, so that it can be tested in here so that if the binary works as expected, it builds accordingly, if it doesn't, it won't. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Suggestion (optional): Given checksums are provided with binaries, it might be prudent to compare the downloaded binary with the checksum so its what we expect, not what we get.
It's a nice approach, but why not just pin aws-iam-authenticator latest version as default value to get closer to a reproducible behavior (by default)? This is an ancient tradeoff between stability and others properties, but for CI, stability is a strong one. |
Hey Everyone, thanks for your input and contributions. I reworked the command to always install the latest version of the |
Checklist
Motivation, issues
Fix issues with non binary releases of aws-iam-authenticator who broken pipelines
Description
Add check and download to get latest version of release aws-iam-authenticator