-
Notifications
You must be signed in to change notification settings - Fork 669
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Fix mounting secrets #5063
Fix mounting secrets #5063
Conversation
Thank you for opening this pull request! 🙌 These tips will help get your PR across the finish line:
|
@yini7777 I think a missing conditional for |
Codecov ReportAll modified and coverable lines are covered by tests ✅
Additional details and impacted files@@ Coverage Diff @@
## master #5063 +/- ##
==========================================
+ Coverage 56.82% 59.11% +2.28%
==========================================
Files 34 645 +611
Lines 2154 55574 +53420
==========================================
+ Hits 1224 32852 +31628
- Misses 837 20129 +19292
- Partials 93 2593 +2500
Flags with carried forward coverage won't be shown. Click here to find out more. ☔ View full report in Codecov by Sentry. |
Yes exactly! |
7e41838
to
1de6d0d
Compare
charts/flyte-core/values-keycloak-idp-flyteclients-without-browser.yaml
Outdated
Show resolved
Hide resolved
3e1d26e
to
3e61e69
Compare
@davidmirror-ops I'm wondering if there is anything needs to be tested or modified in this PR. |
Signed-off-by: [email protected] <[email protected]> Signed-off-by: Yini <[email protected]>
Signed-off-by: [email protected] <[email protected]> Signed-off-by: Yini <[email protected]>
Signed-off-by: Yini <[email protected]>
Signed-off-by: Yini <[email protected]>
Signed-off-by: Yini <[email protected]>
Signed-off-by: Yini <[email protected]>
Signed-off-by: Yini <[email protected]>
25a5830
to
a17f82b
Compare
Signed-off-by: Yini <[email protected]>
@wild-endeavor @davidmirror-ops Thank you for your update and explanation. I've made some modifications to align with your suggestions. Could you please review them? |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I deployed the changes proposed here and validated the behavior is as expected:
create & mount: specify clientSecret in the values file and enabled: true
don't create, but do mount: just set enabled: true
don't do anything: set enabled: false
@davidmirror-ops Thanks a lot for testing it out! Just curious about when validating |
@yini7777 I commented out that line entirely tbh |
@davidmirror-ops Got it! I think it’s also crucial to test if overwriting with The reason I’m so cautious about this is due to this issue. If you have any guidance on how to test it effectively, I’m eager to learn and contribute. Thanks! |
@yini7777 you nailed it. when I set
propeller fails to start:
|
Awesome! Thanks a lot! Then I'll do a rebase and merge it! |
Signed-off-by: Yini <[email protected]>
Signed-off-by: Yee Hing Tong <[email protected]>
Signed-off-by: Yini <[email protected]>
Head branch was pushed to by a user without write access
Congrats on merging your first pull request! 🎉 |
Signed-off-by: [email protected] <[email protected]> Signed-off-by: Andrew Dye <[email protected]>
Tracking issue
Closes: #5053
Why are the changes needed?
Context --> we're upgrading from v1.10.6 to v1.11.0 and nothing has been changed on our end. But got the following error:
we set
Values.secrets.adminOauthClientCredentials.enabled
to false because we don't want Flyte to create the secret, as we have created it via an ExternalSecret . In this case Flyte does not mount the secret to the flytescheduler.Solution --> Add a new value as
Values.secrets.adminOauthClientCredentials.create
. We will set this to false and enabled to true.What changes were proposed in this pull request?
How was this patch tested?
Setup process
Screenshots
Check all the applicable boxes
Related PRs
Docs link