Skip to content

Commit 5f6db1b

Browse files
Apply suggestions from code review
Co-authored-by: Julia Longtin <[email protected]>
1 parent c9abb5f commit 5f6db1b

File tree

2 files changed

+3
-3
lines changed

2 files changed

+3
-3
lines changed

ansible/postgresql-playbooks/postgresql-secrets.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -48,7 +48,7 @@
4848
run_once: true
4949

5050
# ===== SECRET MANAGEMENT FOR EACH CREDENTIAL =====
51-
- name: Check if Kubernetes Secrets exist
51+
- name: Test if Kubernetes Secrets exist
5252
ansible.builtin.shell: |
5353
kubectl get secret {{ item.name }} -n {{ item.namespace }} -o jsonpath='{.data.password}' 2>/dev/null | base64 -d
5454
register: k8s_secret_checks
@@ -60,7 +60,7 @@
6060
loop_control:
6161
label: "{{ item.name }}"
6262

63-
- name: Process secret check results and set passwords
63+
- name: Process secrets test results and set passwords
6464
ansible.builtin.set_fact:
6565
"{{ item.item.password_var }}": "{{ item.stdout }}"
6666
"{{ item.item.password_var }}_source": "kubernetes-secret"
Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1 +1 @@
1-
Changed: PostgreSQL password management now centralized in Kubernetes Secrets (repmgr and wire-server credentials) eliminating hardcoded passwords from inventory.
1+
Changed: PostgreSQL password management is now centralized in Kubernetes Secrets (repmgr and wire-server credentials) eliminating hardcoded passwords from inventory.

0 commit comments

Comments
 (0)