-
Notifications
You must be signed in to change notification settings - Fork 54
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
improvement(memory-edc): remove EDC_VAULT_SECRETS rewrite #1040
Conversation
Quality Gate passedIssues Measures |
I see three slight problems with this PR, not even looking at the code:
|
I created #1058 for the potentially flaky test and changed the description. In this case I can not think of a test, as the changes should not alter the existing behavior. |
@KilianHaag I've restarted the test meanwhile |
@wolf4ood Thanks for triggering them again. I don't understand how they got triggered. |
@KilianHaag it will not, as the deployment test only tests that the runtime can be deployed and booted up. Missing secrets could potentially go unnoticed. |
@@ -252,7 +252,7 @@ spec: | |||
########### | |||
|
|||
# see extension https://github.com/eclipse-tractusx/tractusx-edc/tree/develop/edc-extensions/hashicorp-vault |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
this URL is not valid anymore.
@paullatzelsperger I might be mistaken, but when I explicitly omit the '--set vault.secrets="client-secret:$(cat client.secret)"' from the test deployment, the result will be a CrashLoopBackOff: So what I meant is: If my change would have made all secret(s) unavailable, the deployment should fail, as the client-secret is retrieved during startup. |
WHAT
Removes the rewrite of ENV variable "SECRETS" to edc.vault.secrets and instead uses the EDC_VAULT_SECRETS directly in the memory chart and Dockerfile.
WHY
With the current setup, this is the only ENV variable, that is rewritten. While checking the documentation of the edc components, this rewrite is not apparent. In short: I don't see any reason for it, except potential confusion.
FURTHER NOTES
Also fixes the documentation regarding the seeding of secrets with semicolon separated k:v list
Closes #1039