Bug: Operator mounts BSL credential secret into velero pod breaking multiple credential support #452
Closed
1 task done
Labels
kind/bug
Categorizes issue or PR as related to a bug.
lifecycle/rotten
Denotes an issue or PR that has aged beyond stale and will be auto-closed.
Projects
Contact Details
No response
Describe bug
There is a use case where a user wants to use 2 different secrets providing credentials for the BSL and VSL. When this happens, the secret that gets mounted into the velero pod must be the VSL secret.
In our API, if a user specifies a secret in the BSL spec, then we assume this is the single set of credentials to be used with Velero, and we automatically mount this secret into the velero pod. With this approach, we will never be able to support the use case above.
I propose that we allow a new config field that can explicitly set the credentials to be used for the VSL (or maybe just mention this is the secret that gets mounted in the pod itself) so that if a user wants to specify a secret for the BSL, we can still mount a different secret in the Velero pod until the VSL API can support specifying credentials as well.
What happened?
A bug happened!
OADP Version
0.4.x (Beta)
OpenShift Version
4.9
Velero pod logs
No response
Restic pod logs
No response
Operator pod logs
No response
New issue
The text was updated successfully, but these errors were encountered: