diff --git a/pkg/config/env.go b/pkg/config/env.go index 41041e9bdd..15ca7c4436 100644 --- a/pkg/config/env.go +++ b/pkg/config/env.go @@ -41,13 +41,13 @@ func validateEnvName(name string) error { for _, pattern := range environmentVariableDenyList { // Check for exact match if pattern == name { - return fmt.Errorf("environment variable %q is not allowed", name) + return fmt.Errorf("environment variable %q is not allowed: reserved for internal use", name) } // Check for wildcard pattern if strings.HasSuffix(pattern, "*") { if strings.HasPrefix(name, pattern[:len(pattern)-1]) { - return fmt.Errorf("environment variable %q is not allowed", name) + return fmt.Errorf("environment variable %q is not allowed: reserved for internal use", name) } } } diff --git a/pkg/config/env_variables_test.go b/pkg/config/env_variables_test.go index 302ff53db0..9d4fcc5b79 100644 --- a/pkg/config/env_variables_test.go +++ b/pkg/config/env_variables_test.go @@ -125,7 +125,7 @@ func TestEnvironmentConfig(t *testing.T) { input := fmt.Sprintf("%s=VALUE", pattern) _, err := parseAndValidateEnvironment([]string{input}) require.Error(t, err) - require.ErrorContains(t, err, fmt.Sprintf("environment variable %q is not allowed", pattern)) + require.ErrorContains(t, err, fmt.Sprintf("environment variable %q is not allowed: reserved for internal use", pattern)) }) // test that prefix matches are rejected @@ -135,7 +135,7 @@ func TestEnvironmentConfig(t *testing.T) { input := fmt.Sprintf("%s=VALUE", name) _, err := parseAndValidateEnvironment([]string{input}) require.Error(t, err) - require.ErrorContains(t, err, fmt.Sprintf("environment variable %q is not allowed", name)) + require.ErrorContains(t, err, fmt.Sprintf("environment variable %q is not allowed: reserved for internal use", name)) }) } }