Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Stop copying annotations from OnePasswordItem and Deployment to Secret #104

Merged
merged 3 commits into from
Apr 12, 2022

Conversation

jpcoenen
Copy link
Member

@jpcoenen jpcoenen commented Apr 11, 2022

There is no reason for random annotations to be carried over from a Deploument or OnePasswordItem to a Secret. This can lead to weird problems like the kubectl.kubernetes.io/last-applied-configuration annotation ending up on a Secret as reported in #102.

The only annotation that needs to be copied is operator.1password.io/auto-restart, but that already happens explicitly.

Fixes #102.

There is no reason for random annotations to be carried over. This
can lead to weird problems like the `kubectl.kubernetes.io/last-applied-configuration`
annotation ending up on a Secret.
jpcoenen and others added 2 commits April 12, 2022 10:15
Annotations are no longer copied from the deployment to the secret,
so the test should not assert that the secret has a name annotation.
@jpcoenen jpcoenen merged commit 004e010 into main Apr 12, 2022
@jpcoenen jpcoenen deleted the secret-annotations branch April 12, 2022 16:22
@hudymi
Copy link

hudymi commented Aug 11, 2022

Actually, there is a need, lot's of integration is based on annotations, not only labels. So user should be able to define annotations for the secret.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

Operator copies last-applied-configuration annotation to Secret
3 participants