-
Notifications
You must be signed in to change notification settings - Fork 34
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
feat(helm): generate random secrets when possible #3327
base: master
Are you sure you want to change the base?
Conversation
Doesn't this approach lead to things breaking when you redeploy? For example, the Jena password, redis password etc. Or can those be changed on-the-fly? |
There might be a problem if you keep the PVs BUT not the secrets, then if you also have not kept track of the secrets generated you are screwed indeed. But this is already the case for many secrets in Renku. On the other hand if you don't delete the secrets you'll be fine as the chart reads them. This feature is meant for CI and dev deployments, admins are still supposed to define all the secrets in the values. |
We had some mechanism with hooks that allowed you to do this and not overwrite the secrets on redeploy. I'm not sure if that is still being used. I believe @Panaetius (and or @olevski ?) implemented that at some point. The problem of overwriting secrets for dev/CI deployments makes it worse imho because that's exactly where you are constantly redeploying. So the strategy would need to be to delete the deployment between iterations which is not great. |
This is on my to-do list to review. I just wont be able to get it today. There is a way to simply never delete the auto-generated secrets. That is what we do already in most cases when we autogenerate stuff. |
@aledegano this is still a draft though? Are you thinking of pushing more changes? Should I wait for more code/changes before I review? |
Tasko, yes this is a draft as I need to test it more and I would prefer SwissDataScienceCenter/renku-graph#1768 to be done and integrated. |
@aledegano do you plan on picking this up again? |
Yes, I still want to finish it and get it merged... |
Generates random secrets on deploy whenever possible.