-
Notifications
You must be signed in to change notification settings - Fork 2.7k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
When using Secrets, config functionality should be auto enabled #11258
Comments
I am beginner to this issue. Can you please suggest, how to get started.. |
Fixed in #11748 |
This goes directly against my original intent. The The |
Let's decide on this one before 1.8 goes out |
I don't see a reason to be able to enable/disable only-ConfigMaps or only-Secrets -- you control that by setting the list of ConfigMaps and Secrets to read. You just enable/disable reading config sources from the Kubernetes API server. So the issue is that I probably should have used a different name for |
It's not a one or the other, it's being able to activate secrets without knowing you also must enable the entirety of config for the extension |
Basically I'm leaning towards what Ken mentions here - with the caveat that the user shouldn't have to explicitly set However, as reported in #11968, we should probably not fetch the secrets when WDYT? |
There's no such thing as "activate secrets". You just activate Kubernetes config. The "secrets.enable" thing just makes Quarkus generate additional Kubernetes resources that give the application's service account access to secrets over the Kubernetes API server's API. Again, bad name of the property, it seems :-( |
Irrespective of how it's named, if it needs to be turned on to use secrets, and another config property turned on to make that work, that's a bad experience. It shouldn't require two configuration properties to be turned on to do one thing |
And the reason why we need the property is that we don't know at build time if the user will want to read stuff from secrets. We could generate the resources always, but for some reason I don't recall, we didn't want that. EDIT: and that's of course only when you use Quarkus-generated Kubernetes YAML files. |
I don't mind if there's a property to generate the secrets, but I don't see why I need to set another property in addition to that one |
I think I can come up with something that fits both of your requirements, checking now |
The 2 properties are totally orthogonal, and only appear to not be when you consider Quarkus-generated Kubernetes YAML files to be the only possible way how to obtain Kubernetes YAML files for Quarkus application. Frankly, we could just always generate the additional Kubernetes resources and let users know that if they don't need them, they can delete them :-) (Or, instead of having a property to generate them, have a property to suppress generating them.) |
Description
Currently, if an application wants to read configuration from Kubernetes Secrets, but not a ConfigMap, the following properties need to be defined:
Which for me, was confusing at first as I'd assumed the first enablement was specific to ConfigMaps.
Implementation ideas
When
quarkus.kubernetes-config.secrets.enabled
istrue
, butquarkus.kubernetes-config.enabled
is not present, and thus has the default value, then set it totrue
to simplify the configuration needed.The text was updated successfully, but these errors were encountered: