-
Notifications
You must be signed in to change notification settings - Fork 196
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Support collection of SecretReferences #3435
Labels
high-priority
Issues we intend to prioritize (security, outage, blocking bug)
Milestone
Comments
super-harsh
added
the
high-priority
Issues we intend to prioritize (security, outage, blocking bug)
label
Oct 16, 2023
theunrepentantgeek
changed the title
Support collection of SecretRefereces
Support collection of SecretReferences
Oct 16, 2023
It's not done, we worked around it in #3528. I'm working on this now though. |
matthchr
added a commit
to matthchr/azure-service-operator
that referenced
this issue
Jan 25, 2024
This resolves Azure#3435. []string is transformed into []genruntime.SecretReference. map[string]string is transformed into a new type genruntime.SecretCollectionReference. Unlike genruntime.SecretReference, SecretCollectionReference refers to an entire secret rather than only some parts of it. This is required to keep the keys of the map secret too. It also presents a slightly cleaner user interface than map[string]genruntime.SecretReference would have.
3 tasks
matthchr
added a commit
to matthchr/azure-service-operator
that referenced
this issue
Jan 26, 2024
This resolves Azure#3435. []string is transformed into []genruntime.SecretReference. map[string]string is transformed into a new type genruntime.SecretCollectionReference. Unlike genruntime.SecretReference, SecretCollectionReference refers to an entire secret rather than only some parts of it. This is required to keep the keys of the map secret too. It also presents a slightly cleaner user interface than map[string]genruntime.SecretReference would have.
matthchr
added a commit
to matthchr/azure-service-operator
that referenced
this issue
Jan 26, 2024
This resolves Azure#3435. []string is transformed into []genruntime.SecretReference. map[string]string is transformed into a new type genruntime.SecretCollectionReference. Unlike genruntime.SecretReference, SecretCollectionReference refers to an entire secret rather than only some parts of it. This is required to keep the keys of the map secret too. It also presents a slightly cleaner user interface than map[string]genruntime.SecretReference would have.
3 tasks
matthchr
added a commit
to matthchr/azure-service-operator
that referenced
this issue
Jan 30, 2024
This resolves Azure#3435. []string is transformed into []genruntime.SecretReference. map[string]string is transformed into a new type genruntime.SecretCollectionReference. Unlike genruntime.SecretReference, SecretCollectionReference refers to an entire secret rather than only some parts of it. This is required to keep the keys of the map secret too. It also presents a slightly cleaner user interface than map[string]genruntime.SecretReference would have.
github-merge-queue bot
pushed a commit
that referenced
this issue
Jan 31, 2024
This resolves #3435. []string is transformed into []genruntime.SecretReference. map[string]string is transformed into a new type genruntime.SecretCollectionReference. Unlike genruntime.SecretReference, SecretCollectionReference refers to an entire secret rather than only some parts of it. This is required to keep the keys of the map secret too. It also presents a slightly cleaner user interface than map[string]genruntime.SecretReference would have.
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Describe the current behavior
Currently
isSecret
field for the generator, only lets us specify the string fields to mark as a secret reference.Describe the improvement
We should be able to mark collections(map, slice) as a secret reference
Additional context
Prerequisite for #2934
The text was updated successfully, but these errors were encountered: