-
Notifications
You must be signed in to change notification settings - Fork 113
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Support list of "env" variables in the Build spec #224
Comments
any reasons not to call the |
It kinda brings us back to the strongly typed Vs lossely typed discussion. The idea of having env vars for containers have a strong clear meaning in a strategy agnostic way - and hence I wanted to make them first class citizens in the Build CRD. What do you think? |
@sbose78 make sense, +1. Thanks for explaining |
I like the idea of reusing common abstractions to represent the environment variables, so +1 on this. And on supporting core-v1/EnvVar, what should we do with |
We could start with it now, and then strip it down to a custom API as we deem fit? |
In general I'm OK with leaking core Kubernetes APIs into our own. "On top of k8s" is a fundamental assumption, whereas "powered by Tekton" is a current implementation. |
On Wed, Jun 17, 2020 at 3:28 PM Adam Kaplan ***@***.***> wrote:
ValueFrom is essential if you are passing credentials via an env var,
such as AWS secret keys.
In general I'm OK with leaking core Kubernetes APIs into our own. "On top
of k8s" is a fundamental assumption, whereas "powered by Tekton" is a
current implementation.
+1, assuming we are careful on which APIs we leak so as to not invite
unintended escalation paths
… —
You are receiving this because you are subscribed to this thread.
Reply to this email directly, view it on GitHub
<#224 (comment)>,
or unsubscribe
<https://github.com/notifications/unsubscribe-auth/AA3NU5EXQNKMSDT5DCIGIRTRXEKMPANCNFSM4NHJW5BA>
.
|
I think we're all in agreement so far, but I'd like to amend this:
I think any
Having placeholders like |
@adambkaplan @otaviof @sbose78 - circling back to the You'll see in that example they leverage Tekton parameters to allow for a user supplied vs. hard coded secret name. Correct me if I'm wrong @imjasonh but I believe supporting that pattern lines up with at lease some of your points in #224 (comment), correct ? |
Some quick references I'm sure the folks already commenting here are aware of: (though I still have to refresh my memory on when in Tekton variable substitution occurs on a Task fields vs. a TaskRun.TaskSpec which is what shipwright generates) (same note as above; also, the defaulting plus override notion seems valuable, but my EP will have to get into if/how to surface the existing Tekton stepTemplate into shipwright API) (you see a direct use of params to seed the k8s valueFrom there) |
/assign @coreydaley |
This work was completed in v0.6.0, under SHIP-0018. |
If the user defines the following,
The environment variables should be made available in the BuildStrategy container ( buildStep ) automatically.
These should, of course, not be available in the final deployable image created as a result of Support creation of lean application "runtime" images #183
Also, the
BuildStrategy
author should be able to refer to it in the container step or arg as $(build.env.HTTP_PROXY).The text was updated successfully, but these errors were encountered: