Skip to content
This repository has been archived by the owner on Nov 1, 2022. It is now read-only.

Correctly scope imagePullSecrets by their namespace #2728

Merged
merged 1 commit into from
Jan 8, 2020

Conversation

2opremio
Copy link
Contributor

@2opremio 2opremio commented Jan 8, 2020

PR #2520 broke the scoping of imagePullSecrets when allowing to get workloads from all namespaces at once.

The problem is that a secret cache (seenCreds) was indexed by the secret name (making it namespace specific).

Processing all the namespaces at once without adjusting the scoping opened the door to clashes between secrets from different namespaces which are called the same.

Fixes #2723

PR fluxcd#2520 broke the scoping of imagePullSecrets when
allowing to get workloads from all namespaces at once.

The problem is that a secret cache (`seenCreds`) was indexed
by the secret name (making it namespace specific).

Processing all the namespaces at once without adjusting the
scoping opened the door to clashes between secrets from
different namespaces which are called the same.
Copy link
Member

@hiddeco hiddeco left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Off to a great start of the year 🎣

@2opremio 2opremio merged commit e79a643 into fluxcd:master Jan 8, 2020
@2opremio 2opremio deleted the scope-imagepullsecrets-correctly branch January 8, 2020 23:05
@2opremio 2opremio added this to the 1.17.1 milestone Jan 13, 2020
2opremio added a commit that referenced this pull request Feb 12, 2020
When merging the gitops PoC code a the bugfix at
#2728 was incorrectly overwritten.
2opremio added a commit that referenced this pull request Feb 14, 2020
When merging the gitops PoC code a the bugfix at
#2728 was incorrectly overwritten.
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

Flux uses registry credentials from other namespaces
2 participants