-
Notifications
You must be signed in to change notification settings - Fork 1.2k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[installer] enable protected_secrets by default #13664
Conversation
started the job as gitpod-build-kylos101-enable-protected-secrets.1 because the annotations in the pull request description changed |
955e278
to
9b71206
Compare
started the job as gitpod-build-kylos101-enable-protected-secrets.3 because the annotations in the pull request description changed |
/werft run with-integration-tests=workspace with-large-vm=true 👍 started the job as gitpod-build-kylos101-enable-protected-secrets.4 |
/werft run with-integration-tests=workspace with-large-vm=true with-clean-slate-deployment=true 👍 started the job as gitpod-build-kylos101-enable-protected-secrets.5 |
/werft run with-integration-tests=workspace with-large-vm=true with-clean-slate-deployment=true 👍 started the job as gitpod-build-kylos101-enable-protected-secrets.6 |
9b71206
to
79f47a8
Compare
started the job as gitpod-build-kylos101-enable-protected-secrets.8 because the annotations in the pull request description changed |
dda093f
to
5dee9a5
Compare
c0a9017
to
d889fe9
Compare
Signed-off-by: JenTing Hsiao <[email protected]>
d889fe9
to
d319525
Compare
/werft run 👍 started the job as gitpod-build-kylos101-enable-protected-secrets.18 |
@jenting I think we should update the Release Note |
Thank you for the heads up. |
/werft run with-sh-preview 👍 started the job as gitpod-build-kylos101-enable-protected-secrets.19 |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Tested setup against k3s self-hosted preview!
Description
Enable
protected_secrets
by default forserver
, unless explicitly set to false in the installer config.Change the data type EnableProtectedSecrets to the pointer to prevent a case that
enableProtectedSecrets = false
if the user’s config is below, which will disable the protected secrets.the golden files have values that changed...which weren't altered in theconfig.yaml
files. Not sure why.aside from the fourconfig.yaml
files I changed, there are others, but...not sure why I'd change them. 🤔@mrsimonemms , halp? ☝️ above two tasks...I am bamboozled.
Related Issue(s)
Fixes #13632
How to test
Enabled out of the box
protected_secrets
for non-production in configcatkubectl describe pod <workspace>
, secrets should back values within the pod env vars, rather than plain strings. You could open the workspace from this PR, andkubectl describe pod <workspace>
.Disable at install time
kubectl describe pod <workspace>
, secrets will not back the values. You could open the workspace from the branch andkubectl describe pod <workspace>
.Release Notes
Documentation
Werft options:
If enabled this will build
install/preview
Valid options are
all
,workspace
,webapp
,ide