New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Secret defaultMode / mode not respected initially #34445
Comments
Upgraded
Seems to fix the bug. |
@wernight yes, you need kubectl from 1.4 release too. Glad it works that way! :-) |
@pwittrock @wernight reported that upgrading kubectl to 1.4 did the trick (and it won't work with kubectl 1.3.x as the feature is not there, so the field is probably not sent by kubectl). He reported it here: #4789 @wernight can you confirm this should be closed too? |
Ah, this is probably due to round tripping the objects in kubectl so it wipes out values it doesn't know about |
@pwittrock yeap, this is not expected to work with kubectl 1.3 and the report says it was using that. So quite confident that was the issue :-) |
Should close, no? I expected a validation error but that may be for the future. |
Kubernetes version:
Environment:
What happened:
Changes the permission to 420 instead of 256, so
-rw-r--r--
instead of-r-----
.What you expected to happen:
Should preserve 0700 (256).
How to reproduce it (as minimally and precisely as possible):
Following Secret files permissions, setting
defaultMode
(without settingfsGroup
) in a Yaml like:And doing a
kubectl apply -f my_file.yml
.Note: It's a Deployment with normally only the container
image
that is changing.Anything else do we need to know:
Editing the pod and changing the
defaultMode: 0700
(again) works.Related to #4789
The text was updated successfully, but these errors were encountered: