Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Support warnings for secrets #1265

Merged
merged 3 commits into from
Dec 7, 2020
Merged

Support warnings for secrets #1265

merged 3 commits into from
Dec 7, 2020

Conversation

pleshakov
Copy link
Contributor

Proposed changes

  • Support warnings for TLS and JWK secrets in Ing
  • Support warnings for TLS secrets in VS

@pleshakov pleshakov added the enhancement Pull requests for new features/feature enhancements label Dec 4, 2020
Copy link

@mikestephen mikestephen left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Looks good to me!

}

if err := cnf.nginxManager.Reload(nginx.ReloadForOtherUpdate); err != nil {
return fmt.Errorf("Error when reloading NGINX when updating %v: %v", resource.GetKind(), err)
return allWarnings, fmt.Errorf("Error when reloading NGINX when updating %v: %v", resource.GetKind(), err)
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Would it be good to include resNs/resName here?

Suggested change
return allWarnings, fmt.Errorf("Error when reloading NGINX when updating %v: %v", resource.GetKind(), err)
return allWarnings, fmt.Errorf("Error when reloading NGINX when updating %v %v/%v: %v", resource.GetKind(), resource.GetNamespace(), resource.GetName(), err)

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

same enhancement can be applied to the other app protect related methods. better to do it in a separate PR

}

func generateJWTConfig(secretRefs map[string]*secrets.SecretReference, cfgParams *ConfigParams, redirectLocationName string) (*version1.JWTAuth, *version1.JWTRedirectLocation) {
func generateJWTConfig(owener runtime.Object, secretRefs map[string]*secrets.SecretReference, cfgParams *ConfigParams,
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
func generateJWTConfig(owener runtime.Object, secretRefs map[string]*secrets.SecretReference, cfgParams *ConfigParams,
func generateJWTConfig(owner runtime.Object, secretRefs map[string]*secrets.SecretReference, cfgParams *ConfigParams,

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

good catch

@pleshakov pleshakov merged commit 28e9121 into master Dec 7, 2020
@pleshakov pleshakov deleted the add-warnings branch December 7, 2020 19:14
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement Pull requests for new features/feature enhancements
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants