-
Notifications
You must be signed in to change notification settings - Fork 235
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Need to split credentials secret in 2. #313
Comments
I'm on it. |
As a workaround, with terraform I've created a |
Hi @apogrebnyak, In terraform I would consider using Cheers |
This issue has been automatically marked as stale because it has not had recent activity. It will be closed if no further activity occurs. If this issue is still affecting you, just comment with any updates and we'll keep it open. Thank you for your contributions. |
Freezing this for it to stay in the backlog, since it's out of scope of next release but we're planning on working on this in the newer API. |
Currently
jenkins-operator-credentials-<cr-name>
secret contains both credentials for operator Admin user and API token, namelyI think the original intent was to generate all values in this secret on the operator side.
However with requirement for LDAP admin user be written to this secret by external process we now have a disconnect.
If external process manages the content of the secret (i.e. terraform), then on every successive update the external process will delete
token
andtokenCreationTime
fields, as it knows nothing about these fields.In order to allow for external tool managing admin credentials, I propose splitting
token
andtokenCreationTime
out ofjenkins-operator-credentials-<cr-name>
secret into its ownjenkins-operator-api-token-<cr-name>
secret.This #133 (comment) describes the problem as related to LDAP configuration
The text was updated successfully, but these errors were encountered: