Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Revert "dibyo's point about only EL sink/interceptors reading secrets" #804

Merged
merged 1 commit into from
Oct 15, 2020

Conversation

dibyom
Copy link
Member

@dibyom dibyom commented Oct 15, 2020

Changes

This reverts commit 8eb2067.

Turns out, the webhook does need access to create secrets since it uses it
to create tekton-webhook-certs if it does not exist.

Fixes #803

Submitter Checklist

These are the criteria that every PR should meet, please check them off as you
review them:

  • Includes tests (if functionality changed/added)
  • Includes docs (if user facing)
  • Commit messages follow commit message best practices
  • Release notes block has been filled in or deleted (only if no user facing changes)

See the contribution guide for more details.

Release Notes

NONE

/kind bug

This reverts commit 8eb2067.

Turns out, the webhook does need access to create secrets since it uses it
to create `tekton-webhook-certs` if it does not exist.

Fixes tektoncd#803
@tekton-robot tekton-robot added release-note-none Denotes a PR that doesnt merit a release note. kind/bug Categorizes issue or PR as related to a bug. labels Oct 15, 2020
@tekton-robot tekton-robot added the size/S Denotes a PR that changes 10-29 lines, ignoring generated files. label Oct 15, 2020
@dibyom
Copy link
Member Author

dibyom commented Oct 15, 2020

Still surprised that our e2e tests passed with this...but verified manually on a fresh cluster that his patch fixes #803

@dibyom dibyom requested a review from gabemontero October 15, 2020 16:14
Copy link
Contributor

@khrm khrm left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

/lgtm

@tekton-robot tekton-robot added the lgtm Indicates that a PR is ready to be merged. label Oct 15, 2020
@tekton-robot
Copy link

[APPROVALNOTIFIER] This PR is APPROVED

This pull-request has been approved by: khrm

The full list of commands accepted by this bot can be found here.

The pull request process is described here

Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@tekton-robot tekton-robot added the approved Indicates a PR has been approved by an approver from all required OWNERS files. label Oct 15, 2020
@tekton-robot tekton-robot merged commit 397d151 into tektoncd:master Oct 15, 2020
@dibyom dibyom deleted the secrets branch October 15, 2020 16:25
@gabemontero
Copy link
Contributor

Finally got a second to look at this for a sec ... am I correct in that the knative webhook stuff is what is actually creating the secret @dibyom?

If so, perhaps because of that there is some precedence that we cannot overcome at this time (i.e. knative has mutiple places where it creates secrets dynamically), but a possible counter argument to adding secret creation back would be that we should be creating this secret as part of the resources applied from the config directory.

thoughts?

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
approved Indicates a PR has been approved by an approver from all required OWNERS files. kind/bug Categorizes issue or PR as related to a bug. lgtm Indicates that a PR is ready to be merged. release-note-none Denotes a PR that doesnt merit a release note. size/S Denotes a PR that changes 10-29 lines, ignoring generated files.
Projects
None yet
Development

Successfully merging this pull request may close these issues.

Webhook: TLS handshake error from 10.128.0.8:47288: secret "triggers-webhook-certs" not found
4 participants