Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Bump APB Version #163

Closed
wants to merge 1 commit into from
Closed

Conversation

djzager
Copy link
Contributor

@djzager djzager commented Nov 14, 2017

The asb-modules, specifically asb_encode_binding, creates a
secret instead of writing to a file. This breaks backwards compatibility
with older brokers. Therefore, we should bump the APB version string.

See the
proposal

for more information.

The asb-modules, specifically `asb_encode_binding`, creates a
secret instead of writing to a file. This breaks backwards compatibility
with older brokers. Therefore, we should bump the APB version string.

See [the
proposal](https://github.com/openshift/ansible-service-broker/blob/master/docs/proposals/prop-apb-gen-creds.md)
for more information.
djzager pushed a commit to djzager/ansible-service-broker that referenced this pull request Nov 15, 2017
This change makes it so the broker can handle secrets that are created
by APBs when using the `asb_encode_binding` module.

- Update the broker so that it can handle secrets generated by the APB
  when `asb_encode_binding` module is used from the asb-modules.
- Update `executor::ExecuteApb` to wait for pod to complete, since the
  pod is no longer kept alive for credential extraction.
- Clean up some of the log messages and code format related to apb
  actions.

Implements openshift#544 and the proposal openshift#550. Also addresses the potential
issue in openshift#553.

Depends on the following PRs:
- [ansible-asb-modules#8](ansibleplaybookbundle/ansible-asb-modules#8)
  This is how the secret gets generated.
- [apb-base#7](ansibleplaybookbundle/apb-base#7)
  Remove scripts related to extracting credentials from the containers
  filesystem.
- [ansible-playbook-bundle#163](ansibleplaybookbundle/ansible-playbook-bundle#163)
  Bump the APB versions so freshly built APBs will pass version
  validation checks.
djzager pushed a commit to djzager/ansible-service-broker that referenced this pull request Nov 15, 2017
This change makes it so the broker can handle secrets that are created
by APBs when using the `asb_encode_binding` module.

- Update the broker so that it can handle secrets generated by the APB
  when `asb_encode_binding` module is used from the asb-modules.
- Update `executor::ExecuteApb` to wait for pod to complete, since the
  pod is no longer kept alive for credential extraction.
- Clean up some of the log messages and code format related to apb
  actions.

Implements openshift#544 and the proposal openshift#550. Also addresses the potential
issue in openshift#553.

Depends on the following PRs:
- [ansible-asb-modules#8](ansibleplaybookbundle/ansible-asb-modules#8)
  This is how the secret gets generated.
- [apb-base#7](ansibleplaybookbundle/apb-base#7)
  Remove scripts related to extracting credentials from the containers
  filesystem.
- [ansible-playbook-bundle#163](ansibleplaybookbundle/ansible-playbook-bundle#163)
  Bump the APB versions so freshly built APBs will pass version
  validation checks.
djzager added a commit to djzager/ansible-service-broker that referenced this pull request Nov 15, 2017
This change makes it so the broker can handle secrets that are created
by APBs when using the `asb_encode_binding` module.

- Update the broker so that it can handle secrets generated by the APB
  when `asb_encode_binding` module is used from the asb-modules.
- Update `executor::ExecuteApb` to wait for pod to complete, since the
  pod is no longer kept alive for credential extraction.
- Clean up some of the log messages and code format related to apb
  actions.

Fixes openshift#544
Fixes openshift#553
Implements the proposal openshift#550

Depends on the following PRs:
- [ansible-asb-modules#8](ansibleplaybookbundle/ansible-asb-modules#8) This is how the secret gets generated.
- [apb-base#7](ansibleplaybookbundle/apb-base#7) Remove scripts related to extracting credentials from the containers filesystem.
- [ansible-playbook-bundle#163](ansibleplaybookbundle/ansible-playbook-bundle#163) Bump the APB versions so freshly built APBs will pass version validation checks.
djzager added a commit to djzager/ansible-service-broker that referenced this pull request Nov 16, 2017
This change makes it so the broker can handle secrets that are created
by APBs when using the `asb_encode_binding` module.

- Update the broker so that it can handle secrets generated by the APB
  when `asb_encode_binding` module is used from the asb-modules.
- Update `executor::ExecuteApb` to wait for pod to complete, since the
  pod is no longer kept alive for credential extraction.
- Clean up some of the log messages and code format related to apb
  actions.

Fixes openshift#544
Fixes openshift#553
Implements the proposal openshift#550

Depends on the following PRs:
- [ansible-asb-modules#8](ansibleplaybookbundle/ansible-asb-modules#8) This is how the secret gets generated.
- [apb-base#7](ansibleplaybookbundle/apb-base#7) Remove scripts related to extracting credentials from the containers filesystem.
- [ansible-playbook-bundle#163](ansibleplaybookbundle/ansible-playbook-bundle#163) Bump the APB versions so freshly built APBs will pass version validation checks.
djzager added a commit to djzager/ansible-service-broker that referenced this pull request Nov 20, 2017
This change makes it so the broker can handle secrets that are created
by APBs when using the `asb_encode_binding` module.

- Update the broker so that it can handle secrets generated by the APB
  when `asb_encode_binding` module is used from the asb-modules.
- Update `executor::ExecuteApb` to wait for pod to complete, since the
  pod is no longer kept alive for credential extraction.
- Clean up some of the log messages and code format related to apb
  actions.

Fixes openshift#544
Fixes openshift#553
Implements the proposal openshift#550

Depends on the following PRs:
- [ansible-asb-modules#8](ansibleplaybookbundle/ansible-asb-modules#8) This is how the secret gets generated.
- [apb-base#7](ansibleplaybookbundle/apb-base#7) Remove scripts related to extracting credentials from the containers filesystem.
- [ansible-playbook-bundle#163](ansibleplaybookbundle/ansible-playbook-bundle#163) Bump the APB versions so freshly built APBs will pass version validation checks.
@djzager djzager closed this Nov 20, 2017
@djzager
Copy link
Contributor Author

djzager commented Nov 20, 2017

This is no longer needed.

djzager added a commit to djzager/ansible-service-broker that referenced this pull request Nov 22, 2017
This change makes it so the broker can handle secrets that are created
by APBs when using the `asb_encode_binding` module.

- Update the broker so that it can handle secrets generated by the APB
  when `asb_encode_binding` module is used from the asb-modules.
- Update `executor::ExecuteApb` to wait for pod to complete, since the
  pod is no longer kept alive for credential extraction.
- Clean up some of the log messages and code format related to apb
  actions.

Fixes openshift#544
Fixes openshift#553
Implements the proposal openshift#550

Depends on the following PRs:
- [ansible-asb-modules#8](ansibleplaybookbundle/ansible-asb-modules#8) This is how the secret gets generated.
- [apb-base#7](ansibleplaybookbundle/apb-base#7) Remove scripts related to extracting credentials from the containers filesystem.
- [ansible-playbook-bundle#163](ansibleplaybookbundle/ansible-playbook-bundle#163) Bump the APB versions so freshly built APBs will pass version validation checks.
djzager added a commit to djzager/ansible-service-broker that referenced this pull request Nov 29, 2017
This change makes it so the broker can handle secrets that are created
by APBs when using the `asb_encode_binding` module.

- Update the broker so that it can handle secrets generated by the APB
  when `asb_encode_binding` module is used from the asb-modules.
- Update `executor::ExecuteApb` to wait for pod to complete, since the
  pod is no longer kept alive for credential extraction.
- Clean up some of the log messages and code format related to apb
  actions.

Fixes openshift#544
Fixes openshift#553
Implements the proposal openshift#550

Depends on the following PRs:
- [ansible-asb-modules#8](ansibleplaybookbundle/ansible-asb-modules#8) This is how the secret gets generated.
- [apb-base#7](ansibleplaybookbundle/apb-base#7) Remove scripts related to extracting credentials from the containers filesystem.
- [ansible-playbook-bundle#163](ansibleplaybookbundle/ansible-playbook-bundle#163) Bump the APB versions so freshly built APBs will pass version validation checks.
djzager added a commit to djzager/ansible-service-broker that referenced this pull request Nov 29, 2017
This change makes it so the broker can handle secrets that are created
by APBs when using the `asb_encode_binding` module.

- Update the broker so that it can handle secrets generated by the APB
  when `asb_encode_binding` module is used from the asb-modules.
- Update `executor::ExecuteApb` to wait for pod to complete, since the
  pod is no longer kept alive for credential extraction.
- Clean up some of the log messages and code format related to apb
  actions.

Fixes openshift#544
Fixes openshift#553
Implements the proposal openshift#550

Depends on the following PRs:
- [ansible-asb-modules#8](ansibleplaybookbundle/ansible-asb-modules#8) This is how the secret gets generated.
- [apb-base#7](ansibleplaybookbundle/apb-base#7) Remove scripts related to extracting credentials from the containers filesystem.
- [ansible-playbook-bundle#163](ansibleplaybookbundle/ansible-playbook-bundle#163) Bump the APB versions so freshly built APBs will pass version validation checks.
djzager added a commit to djzager/ansible-service-broker that referenced this pull request Dec 4, 2017
This change makes it so the broker can handle secrets that are created
by APBs when using the `asb_encode_binding` module.

- Update the broker so that it can handle secrets generated by the APB
  when `asb_encode_binding` module is used from the asb-modules.
- Update `executor::ExecuteApb` to wait for pod to complete, since the
  pod is no longer kept alive for credential extraction.
- Clean up some of the log messages and code format related to apb
  actions.

Fixes openshift#544
Fixes openshift#553
Implements the proposal openshift#550

Depends on the following PRs:
- [ansible-asb-modules#8](ansibleplaybookbundle/ansible-asb-modules#8) This is how the secret gets generated.
- [apb-base#7](ansibleplaybookbundle/apb-base#7) Remove scripts related to extracting credentials from the containers filesystem.
- [ansible-playbook-bundle#163](ansibleplaybookbundle/ansible-playbook-bundle#163) Bump the APB versions so freshly built APBs will pass version validation checks.
rthallisey pushed a commit to openshift/ansible-service-broker that referenced this pull request Dec 4, 2017
* Broker should extract credentials from secret

This change makes it so the broker can handle secrets that are created
by APBs when using the `asb_encode_binding` module.

- Update the broker so that it can handle secrets generated by the APB
  when `asb_encode_binding` module is used from the asb-modules.
- Update `executor::ExecuteApb` to wait for pod to complete, since the
  pod is no longer kept alive for credential extraction.
- Clean up some of the log messages and code format related to apb
  actions.

Fixes #544
Fixes #553
Implements the proposal #550

Depends on the following PRs:
- [ansible-asb-modules#8](ansibleplaybookbundle/ansible-asb-modules#8) This is how the secret gets generated.
- [apb-base#7](ansibleplaybookbundle/apb-base#7) Remove scripts related to extracting credentials from the containers filesystem.
- [ansible-playbook-bundle#163](ansibleplaybookbundle/ansible-playbook-bundle#163) Bump the APB versions so freshly built APBs will pass version validation checks.

* Add APB runtime version to our APB Spec object

Update the broker to evaluate the `com.redhat.apb.runtime` label on APBs
(default to `1` when there is no label). Add version checking of this
new min/max apb runtime version and update associated tests.

* Handle bind credential extraction based on runtime

Update apb execution to be handle multiple apb runtime versions.

* Fixing log statements

* Only decode bind creds if encoded

Secrets retrieved using client-go are already decoded. So the extract
credentials function has been updated to only attempt to decode the
credentials if they need it.

Also changed the `log.Error` when the APB completed to a `log.Notice`
since it is not a failure.

* Pull k8s API call to get pod status into k8s client

* Cleanup extract credentials based on comments

* Update proposal based on what is implemented

* Improve adapter log info on apb runtime eval

* Fixes after rebase

* Address review comments and fix unit tests

* Ask for the k8s client when we need it

* Use canary APB images
shawn-hurley pushed a commit to automationbroker/bundle-lib that referenced this pull request Mar 5, 2018
* Broker should extract credentials from secret

This change makes it so the broker can handle secrets that are created
by APBs when using the `asb_encode_binding` module.

- Update the broker so that it can handle secrets generated by the APB
  when `asb_encode_binding` module is used from the asb-modules.
- Update `executor::ExecuteApb` to wait for pod to complete, since the
  pod is no longer kept alive for credential extraction.
- Clean up some of the log messages and code format related to apb
  actions.

Fixes #544
Fixes #553
Implements the proposal #550

Depends on the following PRs:
- [ansible-asb-modules#8](ansibleplaybookbundle/ansible-asb-modules#8) This is how the secret gets generated.
- [apb-base#7](ansibleplaybookbundle/apb-base#7) Remove scripts related to extracting credentials from the containers filesystem.
- [ansible-playbook-bundle#163](ansibleplaybookbundle/ansible-playbook-bundle#163) Bump the APB versions so freshly built APBs will pass version validation checks.

* Add APB runtime version to our APB Spec object

Update the broker to evaluate the `com.redhat.apb.runtime` label on APBs
(default to `1` when there is no label). Add version checking of this
new min/max apb runtime version and update associated tests.

* Handle bind credential extraction based on runtime

Update apb execution to be handle multiple apb runtime versions.

* Fixing log statements

* Only decode bind creds if encoded

Secrets retrieved using client-go are already decoded. So the extract
credentials function has been updated to only attempt to decode the
credentials if they need it.

Also changed the `log.Error` when the APB completed to a `log.Notice`
since it is not a failure.

* Pull k8s API call to get pod status into k8s client

* Cleanup extract credentials based on comments

* Update proposal based on what is implemented

* Improve adapter log info on apb runtime eval

* Fixes after rebase

* Address review comments and fix unit tests

* Ask for the k8s client when we need it

* Use canary APB images
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

1 participant