Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Map PV secrets in parameters when restoring PVs #1602

Merged
merged 2 commits into from
Nov 5, 2024

Conversation

rakeshgm
Copy link
Member

@rakeshgm rakeshgm commented Oct 23, 2024

Map PV secrets in parameters when restoring PVs across peer clusters

@rakeshgm rakeshgm force-pushed the secrets-mask branch 4 times, most recently from a32c87d to 5245f52 Compare October 24, 2024 13:13
Copy link
Member

@ShyamsundarR ShyamsundarR left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM! Add a test for the mapping along the lines of this test

Keep the test as a separate PR for now, such that we can merge this in stages.

Map PV secrets in parameters when restoring PVs
across peer clusters.

Signed-off-by: rakeshgm <[email protected]>
create SC in the sync basic test

Signed-off-by: rakeshgm <[email protected]>
@rakeshgm rakeshgm changed the title secrets masking Map PV secrets in parameters when restoring PVs across peer clusters Oct 28, 2024
@rakeshgm rakeshgm changed the title Map PV secrets in parameters when restoring PVs across peer clusters Map PV secrets in parameters when restoring PVs Oct 28, 2024
@rakeshgm rakeshgm marked this pull request as ready for review October 28, 2024 10:38
@ShyamsundarR
Copy link
Member

e2e failure is related to #1557

@ShyamsundarR ShyamsundarR merged commit d858776 into RamenDR:main Nov 5, 2024
19 of 20 checks passed
//nolint:gosec
const (
// secretRef keys
controllerPublishSecretName = "csi.storage.k8s.io/controller-publish-secret-name"
Copy link
Member

@Madhu-1 Madhu-1 Nov 5, 2024

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

What about the provisioner secrets that are present in pv annotation? Want we update that as well?

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Looks like am late 😕

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Provisioner secrets are in PV annotations? I assume these are needed for Delete operations?

If so @rakeshgm add a new PR to update that as well.

Copy link
Member

@Madhu-1 Madhu-1 Nov 5, 2024

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

apiVersion: v1
items:
- apiVersion: v1
  kind: PersistentVolume
  metadata:
    annotations:
      pv.kubernetes.io/provisioned-by: rook-ceph.rbd.csi.ceph.com
      volume.kubernetes.io/provisioner-deletion-secret-name: rook-csi-rbd-provisioner
      volume.kubernetes.io/provisioner-deletion-secret-namespace: rook-ceph
    creationTimestamp: "2024-11-05T09:51:09Z"
    finalizers:

Yes in the pv annotation for delete operation.

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Added a task in #1616

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants