Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

separate cred secrets for azure/gcp/aws #373

Merged
merged 1 commit into from Dec 2, 2019

Conversation

sseago
Copy link
Contributor

@sseago sseago commented Nov 20, 2019

This allows for aws, gcp, and azure cred secrets to coexist on the same velero instance. Only one set of credentials per provider is still a limitation, but this allows the use of multiple providers at once for a given controller instance.

This PR requires a (forthcoming) mig-operator PR for azure/gcp use, since without it velero won't look in the right location for (or mount) those provider secrets.

@sseago
Copy link
Contributor Author

sseago commented Nov 20, 2019

Required mig-operator PR: migtools/mig-operator#166

Copy link
Contributor

@jortel jortel left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM
One thing though: By convention the term CloudSecret in the codebase refers to the cloud secret used by velero. So the velero is implied. The new methods and constants added include Velero. To be consistent, we should either remove Velero from the new names or add Velero all of the other names in the codebase.

@sseago sseago merged commit 94f08c1 into migtools:master Dec 2, 2019
jortel pushed a commit that referenced this pull request Dec 16, 2019
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

3 participants