-
Notifications
You must be signed in to change notification settings - Fork 67
Add decoding support for secret values in config package #504
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: main
Are you sure you want to change the base?
Conversation
- Introduced a new field `Encoding` in the `Secret` struct to specify the encoding type of the secret value, currently supporting "base64". - Added a `DecodeContent` method to handle decoding of the secret content based on the specified encoding.
- Update server to handle base64 encoded secrets during mount - Add test cases for base64 and non-encoded secret scenarios - Update example configuration template to demonstrate base64 encoding
/assign jainsuyogj |
Hi all, do i need to do anything here? there are workflows with pending checks and im not sure if i need to trigger anything on my side? @jainsuyogj or @dargudear-google any guidance? |
- Added environment variables for PROJECT_ID, CLUSTER_NAME, and LOCATION_ID using GitHub secrets. - Updated project_id in the setup-gcloud action to reference the new secret.
- Updated CLUSTER_NAME, PROJECT_ID, and LOCATION_ID to use environment variables with default values. - This change allows for more flexible configuration when running the script.
.DS_Store
Outdated
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This file is not required for the PR
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
ok no worries, reverted to the original
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
The file still is shown as a "created file" in this PR. Revert hasn't happened I believe
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
The .DS_Store file
.github/workflows/e2e.yml
Outdated
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
The {{ secrets.TEST_PROJECT_ID}} isn't defined in our project. Setting it empty(due to non existence) might cause problems to the default code in runner.sh. Maybe tests should catch this.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
ok no worries, reverted to the original
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Changes LGTM
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Minor comment: But should the title say that we are adding decoding support for secret values?
.gitignore
Outdated
@@ -0,0 +1 @@ | |||
.DS_Store |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
@dgulli Can you do a "git rm .DS_Store" and "git rm .gitignore" on your branch and then push a commit?
If you wish, you can keep these file locally on your branch, but as you have pushed those changes, they will also get merged in the GCP repo, which we don't want.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Done
@dgulli Do you have an concrete example of what use case this solves? |
Encoding
in theSecret
struct to specify the encoding type of the secret value, currently supporting "base64".DecodeContent
method to handle decoding of the secret content based on the specified encoding.