-
Notifications
You must be signed in to change notification settings - Fork 616
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
flux create source git
with --password
fails to create secret
#3892
Comments
The current version of the CLI is Flux v2 I tested your scenario against the latest CLI, and it did not delete the token. However, I only have GitHub to work with right now, I cannot test on DevOps today, but if you're seeing a secret that gets deleted by Can you try the current Flux release please? |
Is this scenario still valid where we could have the password flag without the username ? |
Typically the convention is to use the username I think there is a minor UX issue here but I'm not quite sure what it is. I'm renaming this issue because I think we've established that it's not deleting any secrets, that would be bad. I think you should be able to use We need someone to make the case for change a bit clearer in order to follow this up. |
Let's change the issue title to:
(Turns out I don't have "edit issue/PR title" permissions here, with only the triage role) |
flux create source git
with --password
fails to create secret
I see, it makes sense. I will have time this weekend to submit the PR |
If no one else is working on this issue, may I work on it? The PR created has the tag |
Absolutely, thanks for volunteering and welcome to ping me for reviews 🙇 Can you see the issue with the linked PR #4119? It's not clear to me from the comment thread yet |
Describe the bug
When using flux cli, I expect to be able to use Azure DevOps personal access token (PAT). But the command "flux create source git" delete the Kubernetes secret when the username is not specified. If we modify the secret manually, removing the username, everything still working.
Steps to reproduce
Expected behavior
A kubernetes secret shoul be created without username but with password field.
Screenshots and recordings
No response
OS / Distro
Ubuntu 20.04
Flux version
v0.34.0
Flux check
► checking prerequisites
✗ flux 0.34.0 <2.0.0-rc.3 (new version is available, please upgrade)
✔ Kubernetes 1.23.7 >=1.20.6-0
✔ helm-controller: deployment ready
✔ image-automation-controller: deployment ready
✔ image-reflector-controller: deployment ready
✔ kustomize-controller: deployment ready
✔ notification-controller: deployment ready
✔ source-controller: deployment ready
✔ alerts.notification.toolkit.fluxcd.io/v1beta1
✔ buckets.source.toolkit.fluxcd.io/v1beta2
✔ gitrepositories.source.toolkit.fluxcd.io/v1beta2
✔ helmcharts.source.toolkit.fluxcd.io/v1beta2
✔ helmreleases.helm.toolkit.fluxcd.io/v2beta1
✔ helmrepositories.source.toolkit.fluxcd.io/v1beta2
✔ imagepolicies.image.toolkit.fluxcd.io/v1beta1
✔ imagerepositories.image.toolkit.fluxcd.io/v1beta1
✔ imageupdateautomations.image.toolkit.fluxcd.io/v1beta1
✔ kustomizations.kustomize.toolkit.fluxcd.io/v1beta2
✔ providers.notification.toolkit.fluxcd.io/v1beta1
✔ receivers.notification.toolkit.fluxcd.io/v1beta1
✔ all checks passed
Git provider
Azure DevOps
Container Registry provider
No response
Additional context
No response
Code of Conduct
The text was updated successfully, but these errors were encountered: