-
Notifications
You must be signed in to change notification settings - Fork 0
feat: option to create secret group for storing cert #368
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
|
/run pipeline |
|
/run pipeline |
shemau
left a comment
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Specific comments on the code, but also. general observations.
Generally speaking this is a code pattern for DAs. If a DA is using secrets manager it is supporting secret groups. Is there an issue/epic to make sure a consistent pattern is adopted across all DAs?
I also have a concern about migration. Starting with an existing consumer using this feature by setting the ID. What happens? It seem likely that the new DA will drop the ID. Then it will default the new values which probably leads to it destroying the existing secret and creating a new one in the default group. Even if the code gets lucky and it does an update in place to move the secret, so that the secret CRN stays the same, it just changed who can read the secret. Likely the CRN will change impacting any external processes that are using it.
@shemau This is not a breaking change, there is always one secret group which has name and ID as default, currently default value of the |
|
I still think there is a specific situation where a secret could be destroyed. Let me try again. A secret group ABCD has ID 1234. Currently 1234 is passed into DA. Secret group ABCD has the secret created in it. |
Yes in that case, secret will get deleted from old secret group and will be recreated. Can we ask the consumer to use |
|
/run pipeline |
|
/run pipeline |
|
@shemau i addressed review comments, need your suggestion on the migration here. |
9150ddc to
17f4ec7
Compare
|
/run pipeline |
…s/terraform-ibm-secrets-manager-private-cert into create-secret-group
|
/run pipeline |
shemau
left a comment
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM.
|
🎉 This PR is included in version 1.6.0 🎉 The release is available on:
Your semantic-release bot 📦🚀 |
Description
Enables option to create secret group in DA for storing cert instead of giving ID of a pre existing secret group.
Release required?
x.x.X)x.X.x)X.x.x)Release notes content
Default value of
cert_secrets_group_idhas changed fromdefaulttonullbecause if secrets manager instance is created with addons flow, certificate can only be created in default group as that is the only secret group present and this is not a great practice. If null value is passed, DA will create a new secret group and hence your certificate might get deleted from existing secret group and will get recreated in the newly created secret group. If you want to avoid this you will have to manually change backcert_secrets_group_idvalue to your existing secret group ID.Run the pipeline
If the CI pipeline doesn't run when you create the PR, the PR requires a user with GitHub collaborators access to run the pipeline.
Run the CI pipeline when the PR is ready for review and you expect tests to pass. Add a comment to the PR with the following text:
Checklist for reviewers
For mergers