New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
export the credential file location env variable #738
Conversation
It just seems weird that |
Maybe... That could affect whether variables propagate through to subprocesses? I'm not sure. OOI is also failing
For now I'm going to revert and see if we can get the OOI deployment to finish. |
Might have found the culprit. A recent update to I don't know where it is getting the information for what to encrypt, but I could definitely see it interfering with reading files. @consideRatio do you know offhand? I see you helped a lot with that update. I'm learning more about SOPS atm. |
@salvis2 hmmmm... The issue is
And these credentials have been located by
Hmm... and hubploy is supposed to have decrypted this file? Then I don't think it have, because of a Note that I believe you won't use sops at all unless you have .yaml or .json with encrypted by sops, which is identified by finding |
Gotcha. Thank you for taking a look! It was just a suspicion, so I'll keep digging to see what the issue is. |
@salvis2 this PR doesn't have a failing check, so where is the CI system running? I have not yet managed to overview the pangeo related repositories properly. |
@consideRatio the CI system is on CircleCI. I think the |
From some of the recent commit testing, it seems like updating to the newer |
Some local testing this morning: Test 1With my normal credentials setup in I run the following to point to a credentials file that does not have the proper credentials to connect to said cluster.
Yielding
Running Test 2 (from a fresh Terminal)
Yields
Now, running
Conclusion
SuspicionActually, I have another suspicion. So that old version of My guess is that the original command
never actually worked, but since the |
I will probably merge this first when ready for control, then update the |
So the CI system has been failing on the step that is supposed to update the IP addresses that are allowed to access the AWS cluster. Here is the code and the response:
@TomAugspurger do you think this commit will make a difference? I know there are differences in using
export
vs not, so if theupdate-cluster-config
command spawns a new process, it might not be getting the value of the env variable, thus the "Unable to locate credentials."My other thought is that somehow it might still be
git-crypt
'd, but that seems unlikely.