-
Notifications
You must be signed in to change notification settings - Fork 723
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Keeping the Jenkins agent secret stable #2250
Comments
In the end went with manually provisioning the secrets |
hey @gaborbernat do you mind share how you were able to create the secrets you mentioned before the jenkins start? I'm trying to investigate the options that we have about this issue: jenkinsci/kubernetes-operator#691 (comment) for the jenkins operator and understanding you experience would be great! |
I used some start script to start the Jenkins instance, and done it there. |
Thanks for getting back, can you please share at list the snippet? did you manually moved the files or manually create the secrets via groovy/api etc? |
I first started the instance without having the keys. This generates them. Then copied these generated ones going ahead into the right place. Not much else to share 🤔 |
Understood, so you moved the files, thanks :) |
Currently whenever I bootstrap the instance a new jenkins agent secret is generated. How can I make it deterministic? I think this is
secrets/jenkins.slaves.JnlpSlaveAgentProtocol.secret
that's generated on startup 🤔 Perhaps here https://github.com/jenkinsci/jenkins/blob/master/core/src/main/java/jenkins/slaves/JnlpAgentReceiver.java#L40The text was updated successfully, but these errors were encountered: