Skip to content
This repository has been archived by the owner on Jul 30, 2024. It is now read-only.
/ NuGet.Jobs Public archive

Migrate job to JsonConfig #550

Merged
merged 2 commits into from
Aug 28, 2018
Merged

Migrate job to JsonConfig #550

merged 2 commits into from
Aug 28, 2018

Conversation

chenriksson
Copy link
Member

@chenriksson chenriksson commented Aug 27, 2018

Discovered that I didn't migrate this job to JsonConfig, like other legacy jobs.

Now tracking with https://github.com/NuGet/Engineering/issues/1662, instead of https://github.com/NuGet/Engineering/issues/1612

</PackageReference>
<PackageReference Include="NuGet.Services.Logging">
<Version>2.27.0</Version>
</PackageReference>
<PackageReference Include="NuGet.Services.Sql">
<Version>2.27.0</Version>
<Version>2.28.0</Version>
Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Fixing warnings due to partial dependencies upgrade in a previous PR. KeyVault and Sql libraries had been updated to 2.28.0 for Validation.Common.Job, but not Jobs.Common.

https://github.com/NuGet/NuGet.Jobs/blame/master/src/Validation.Common.Job/Validation.Common.Job.csproj#L106

/// <summary>
/// Obsolete: replace with IcM configuration
/// </summary>
public string PagerDutyApiKey { get; set; }
Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Code still uses PagerDuty. I can remove in follow-up PR, if it's not too time consuming.

},

"SupportRequestDb": {
"ConnectionString": "Data Source=tcp:#{Deployment.Azure.Sql.SupportRequestDatabaseAddress};Initial Catalog=nuget-dev-supportrequest;User ID=$$Dev-SupportRequestDBWriter-UserName$$;Password=$$Dev-SupportRequestDBWriter-Password$$;Encrypt=True;TrustServerCertificate=False;Connection Timeout=30;"
Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Note: we don't have DEV/INT enabled on Octopus, but I'm adding config in case we want to enable or to ease testing.

I didn't want to add new DB creds to KeyVault, so these reference the existing writer credentials. This will change when AAD is configured.

-VaultName "#{Deployment.Azure.KeyVault.VaultName}" ^
-ClientId "#{Deployment.Azure.KeyVault.ClientId}" ^
-CertificateThumbprint "#{Deployment.Azure.KeyVault.CertificateThumbprint}" ^
-Configuration "#{Jobs.supportrequests.notifications.Configuration}" ^
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

nit: consistent indentation

Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants