-
Notifications
You must be signed in to change notification settings - Fork 40k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Secrets fixups #4653
Secrets fixups #4653
Conversation
de24508
to
13bf2aa
Compare
Will there be any attempt to extract an interface from these or otherwise make common attributes across all types? I am referring to the comment you left in another thread where you might want to request an EmptyDir with specific Throughput performance characteristics. |
Assigning to @erictune, feel free to rebalance. |
There may be common interfaces across them, but I want to use NFS and iscsi On Fri, Feb 20, 2015 at 5:28 AM, Mark Turansky notifications@github.com
|
LGTM. Not passing tests. |
looks like there is a new precommit hook. maybe a rebase will help |
13bf2aa
to
d77d2df
Compare
rebased and pushed. On Fri, Feb 20, 2015 at 10:40 AM, Eric Tune notifications@github.com
|
@@ -1329,7 +1329,7 @@ const MaxSecretSize = 1 * 1024 * 1024 | |||
type SecretType string |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
@bgrant0607 wanted this renamed to SecretKind
and for it to come before the Data
field.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Will do in next push
@derekwaynecarr FYI |
@thockin LGTM with the exception of renaming |
@thockin Rereading the comment on #4514 to make sure all feedback was accounted for here, I found this comment #4514 (comment). Tl;dr: need description on fields. |
d77d2df
to
f024037
Compare
Pushed update with SecretKind. It looks like descriptions are OK now - I don't find any missing. |
@thockin One last nit :) @bgrant0607 wanted |
Little problem: if we rename Secret.Type to Secret.Kind we now conflict with TypeMeta.Kind, which is embedded in Secret. If we rename it to SecretKind then it is different from a dozen other "Kind" fields, which just happen to not be on API objects. @bgrant0607 for an opinion on what to do with this. |
Annoyingly, this is only a problem in the Go inline structs, not in the json. Taking a look. |
Propose to drop the Type/Kind from this series and deal with it on its own? If OK, I'll push a new update. |
SecretTypeOpaque SecretType = "opaque" // Opaque (arbitrary data; default) | ||
SecretTypeKubernetesAuthToken SecretType = "kubernetes-auth" // Kubernetes auth token | ||
SecretTypeDockerRegistryAuth SecretType = "docker-reg-auth" // Docker registry auth | ||
SecretKindOpaque SecretKind = "opaque" // Opaque (arbitrary data; default) |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
These don't follow our constant convention because?
Also we have AffinityType floating around |
And LimitType, FSType, CapabilityType, CauseType. Kinds include only PodConditionKind and NodeConditionKind. So I guess it's the Kinds that are odd. If you want to revert to SecretType, I'm ok with that. |
f024037
to
3e7248f
Compare
I think this latest push addresses all comments except Kind/Type which we can reconsider on its own. |
@thockin LGTM 👍 Thanks for fixing these nits. |
LGTM accomplished. Will self-commit when green. Will think on type/kind. |
Things I wanted to fix as I reviewed all the secrets work.