Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add SealedSecret 'template' to use when constructing Secret #180

Merged
merged 5 commits into from
Jul 10, 2019
Merged

Conversation

mkmik
Copy link
Collaborator

@mkmik mkmik commented Jul 9, 2019

Merge #129 into current codebase (which as diverged in the meantime)

This change adds a spec.template to the SealedSecrets schema, which
includes metadata and type used when constructing the new Secret.
(All the Secret fields other than data/encryptedData)

Also this change adds:

Events to the SealedSecret describing progress/errors while
unsealing.
A SealedSecret status structure that exposes overall
success/failure.

Fixes #92
Fixes #72

@mkmik mkmik changed the title Template Add SealedSecret 'template' to use when constructing Secret Jul 9, 2019
@mkmik mkmik force-pushed the template branch 5 times, most recently from fcf547d to 68631a2 Compare July 10, 2019 16:39
anguslees and others added 5 commits July 10, 2019 18:43
This change adds a `spec.template` to the SealedSecrets schema, which
includes `metadata` and `type` used when constructing the new Secret.
(All the Secret fields _other_ than `data`/`encryptedData`)

Also this change adds:
- Events to the SealedSecret describing progress/errors while
  unsealing.
- A SealedSecret `status` structure that exposes overall
  success/failure.

Fixes #92
Fixes #72
@mkmik
Copy link
Collaborator Author

mkmik commented Jul 10, 2019

bors r+

@bors
Copy link
Contributor

bors bot commented Jul 10, 2019

👎 Rejected by too few approved reviews

@atomatt
Copy link

atomatt commented Jul 10, 2019

bors r+

based on a very superficial review 🤞

@bors
Copy link
Contributor

bors bot commented Jul 10, 2019

🔒 Permission denied

Existing reviewers: click here to make atomatt a reviewer

@mkmik
Copy link
Collaborator Author

mkmik commented Jul 10, 2019

bors delegate=atomatt

@bors
Copy link
Contributor

bors bot commented Jul 10, 2019

✌️ atomatt can now approve this pull request

@mkmik mkmik requested a review from atomatt July 10, 2019 17:14
Copy link

@atomatt atomatt left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

very superficial review, mostly to please bors.

@atomatt
Copy link

atomatt commented Jul 10, 2019

bors r+

bors bot added a commit that referenced this pull request Jul 10, 2019
180: Add SealedSecret 'template' to use when constructing Secret r=atomatt a=mkmik

Merge #129 into current codebase (which as diverged in the meantime)

```
This change adds a spec.template to the SealedSecrets schema, which
includes metadata and type used when constructing the new Secret.
(All the Secret fields other than data/encryptedData)

Also this change adds:

Events to the SealedSecret describing progress/errors while
unsealing.
A SealedSecret status structure that exposes overall
success/failure.
```

Fixes #92
Fixes #72

Co-authored-by: Angus Lees <gus@inodes.org>
Co-authored-by: Marko Mikulicic <mkm@bitnami.com>
Co-authored-by: Christopher Harm <crh5255@psu.edu>
@bors
Copy link
Contributor

bors bot commented Jul 10, 2019

Build succeeded

@bors bors bot merged commit e1ba7ef into master Jul 10, 2019
@bors bors bot deleted the template branch July 10, 2019 17:28
@bric3
Copy link

bric3 commented Jul 22, 2019

Could be labelled as 0.8.0 as well :)

@mkmik
Copy link
Collaborator Author

mkmik commented Jul 22, 2019

Could be labelled as 0.8.0 as well :)

To avoid overcrowding the milestone "changelog" I tended to favour labelling tracking issues (such as #92 in this case) over PRs. My mind can easily be changed with arguments :-)

@bric3
Copy link

bric3 commented Jul 22, 2019

@mkmik I had the opposite practice as it allows to track which work get into which milestone, after several years I found it useful. But your point is just as fine it just address different concerns ;)

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

Missing annotations & labels Allow a user to know whether the controller actually unsealed a secret
5 participants