-
Notifications
You must be signed in to change notification settings - Fork 167
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
refactor(controller): minor cleanup of aws managed identity credential helper #2318
Conversation
Signed-off-by: Kent Rancourt <kent.rancourt@gmail.com>
✅ Deploy Preview for docs-kargo-akuity-io ready!
To edit notification comments on pull requests, go to your Netlify site configuration. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM
Codecov ReportAttention: Patch coverage is
Additional details and impacted files@@ Coverage Diff @@
## main #2318 +/- ##
==========================================
- Coverage 47.26% 47.24% -0.02%
==========================================
Files 244 244
Lines 17384 17391 +7
==========================================
Hits 8216 8216
- Misses 8755 8762 +7
Partials 413 413 ☔ View full report in Codecov by Sentry. |
Successfully created backport PR for |
Similar to a 403 when attempting to get an ECR auth token via an assumed IAM role, I believe that a 403 when attempting to get an ECR token via the controller's own IAM role should be treated more like simply coming up empty-handed and treated less like an error. In this way, the caller can move on to checking other credential helpers.