Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Supporting Tower 3.2.x #53

Closed
20 of 21 tasks
jameswnl opened this issue Jan 15, 2018 · 6 comments
Closed
20 of 21 tasks

Supporting Tower 3.2.x #53

jameswnl opened this issue Jan 15, 2018 · 6 comments

Comments

@jameswnl
Copy link
Contributor

jameswnl commented Jan 15, 2018

Credentials

Major Changes

  • Tower 3.2.x upgrade will split up a machine credential which has vault_password value and both will remain associated to job_templates (if any)
    ** For us, we'll create/update accordingly (have to test and confirm if the new machine credential will keep the original ID.
  • Tower 3.2.x upgrade will drop azure_classic and rackspace credentials (and previously associated job_templates will just lose them
    ** Dropping azure classic and rackspace credential types manageiq#16936 and Dropping azure classic and rackspace credential types #58
    ** After upgrade, refresh will destroy them
  • Other newly added:
    ** Vault
    ** Ansible Tower
    ** Insights
    ** rhev
    ** custom credential type (Custom credentials will not be managed by the V1 API)

Todo

Others

  • Investigate usage of custom credential (e.g. supporting Azure classic?)
@jameswnl
Copy link
Contributor Author

jameswnl commented Feb 2, 2018

@gmcculloug @bdunne @syncrou

@gmcculloug
Copy link
Member

@jameswnl Thanks for capturing these notes.

I would suggest adding an item in the Todo section for "will machine credential will keep the original ID". Also, I assume there is work to enable the UI to CRUD the new Vault credentials. From what I understand this is backend work, but you would know better.

Another item, but maybe not a Todo here is to investigate custom credentials more so we can support types like Azure through this new feature.

@gmcculloug
Copy link
Member

screen_shot_2018-02-21_at_1_18_48_pm

@gmcculloug
Copy link
Member

@jameswnl I think we have addressed all the areas here, if you agree I think we can close this issue.

@jameswnl
Copy link
Contributor Author

@gmcculloug I've added a todo to test the upgrade scenario and its impact on the converted/dropped credentials.

@miq-bot miq-bot added the stale label Oct 1, 2018
@miq-bot
Copy link
Member

miq-bot commented Oct 1, 2018

This issue has been automatically marked as stale because it has not been updated for at least 6 months.

If you can still reproduce this issue on the current release or on master, please reply with all of the information you have about it in order to keep the issue open.

Thank you for all your contributions!

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

5 participants