-
Notifications
You must be signed in to change notification settings - Fork 2.1k
update secret names and doc for osa #1347
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
projects/azure/README.md
Outdated
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
s/contains/contain/
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Both of them contains same data.
They don't actually contain the same data. More precisely the format differs. We should probably call out that the env based secret is what we use for deploying clusters in Azure (so it's a drop-in config file for Openshift) whereas the file based approach is what ci-operator expects in order to source it in its environment.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Sorry, azure-purge is using the env based secret. Is it the same as azure.conf? If not disregard my previous comment.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
One is just export FOO=BAR in the file, second one is --from-literal=foo=${BAR}. Same credentials, same variables just format.
|
can't we re-engineer to make cluster-secrets-azure-file go away instead? |
|
Unfortunately it's needed by the ci-operator. We could potentially have an
init container in the ci-operator pod that reads the azure-purge secret and
writes down the ci-operator format. We'd still need to keep the azure-purge
secret in two different place (azure and ci namespace) until the developer
productivity team creates the secret mirror controller.
…On Mon, Sep 3, 2018, 22:20 Jim Minter ***@***.***> wrote:
can't we re-engineer to make cluster-secrets-azure-file go away instead?
—
You are receiving this because your review was requested.
Reply to this email directly, view it on GitHub
<#1347 (comment)>,
or mute the thread
<https://github.com/notifications/unsubscribe-auth/ADuFf15FEjHoqs00vMjwFq_jTFBL7i7Bks5uXY71gaJpZM4WXtdl>
.
|
|
/hold |
|
@jim-minter Current flow:
Where the secret name is the folder name we passed into argument. And it comes available to our Considering we are could move to env based secret here, but now we need to do local development. Which involved passing directory as a secret. Considering we do all this and make this tiny miny secret same, we get all this burden of "doing things our way + local development" We could do as you suggest few weeks ago and mount env as file secret directly and result would be: We still need to do sourcing of individual files, instead of one and for local development I have to prepare myself 4 files, instead of one. Answer is - yes its possible, and it might be right way from secret point of view, but it becomes burden we will need to maintain down the stream in a form of unnecessary complexity. |
|
About the rebase request: We have mass-renamed all ci-operator configuration files from |
|
@petr-muller This was fast :) will fix this accordingly |
|
ping @jim-minter |
|
thanks for the explanation @mjudeikis - go ahead as you were :) /hold cancel |
daf839c to
a09b3f9
Compare
|
Post-merge these need to be executed: |
|
ping @stevekuznetsov @Kargakis |
projects/azure/README.md
Outdated
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
the same data but in a different format
which of course can be argued that it's not the same data :)
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
In can :) I will be happy to argue with anybody who is not you at any time when somebody comes and pick this as maintenance job :D
|
New secrets created |
|
lets merge it after lunch as if I left some typos in renaming all stuff will go down :D |
|
/lgtm |
|
[APPROVALNOTIFIER] This PR is APPROVED Approval requirements bypassed by manually added approval. This pull-request has been approved by: kargakis, mjudeikis The full list of commands accepted by this bot can be found here. The pull request process is described here DetailsNeeds approval from an approver in each of these files:Approvers can indicate their approval by writing |
|
@mjudeikis: Updated the
DetailsIn response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
|
@mjudeikis: The following updates succeeded:
DetailsIn response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
ptal: @Kargakis , @jim-minter
cc: @openshift/sig-azure