New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
docs: Reword SSO Client Secrets doc #8666
docs: Reword SSO Client Secrets doc #8666
Conversation
Signed-off-by: Trung <trung.hoang@pricehubble.com>
Codecov Report
@@ Coverage Diff @@
## master #8666 +/- ##
==========================================
- Coverage 46.14% 46.12% -0.02%
==========================================
Files 217 217
Lines 25912 25912
==========================================
- Hits 11958 11953 -5
- Misses 12297 12301 +4
- Partials 1657 1658 +1
Continue to review full report at Codecov.
|
to obtain the actual value. This allows you to store the `clientSecret` as a kubernetes secret. | ||
Kubernetes secrets must be base64 encoded. To base64 encode your secret, you can run | ||
`printf RAW_STRING | base64`. | ||
`argocd-secret` can be used to store sensititve data which can be referenced by ArgoCD. Values starting with `$` in configmaps is interpreted as follows: |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Minor Spelling mistakes:
sensititve data - >sensitive data
is interpreted -> are interpreted
|
||
Data should be base64 encoded before it is added to `argocd-secret`. You can do so by running `printf RAW_SECRET_STRING | base64`. | ||
- If value has the form: `$<secret>:a.key.in.k8s.secret`, look for a k8s secret with the name `<secret>` (minus the `$`), and reads it value. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
and reads it value -> and read its value
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Some minor spelling mistakes. Otherwise looks good to me.
Signed-off-by: Trung <trung.hoang@pricehubble.com>
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Thank you!
The Sensitive Data and SSO Client Secrets section can mislead users to thinking that the secret value needs to be base encoded twice. This PR attempts to reword to make the doc clearer.
Checklist: