-
Notifications
You must be signed in to change notification settings - Fork 246
Add documentation on Snapshot secret support #189
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Comments
PR #190 addressed 1, but did not address 2 (documenting common use cases). Will leave this bug open to track that. |
One more item: we should better document why SP should avoid deletion secrets (user could wipe out that secret), and suggest alternatives (for backend credentials, inject directly in to CSI driver; for storage pools, also inject directly in to CSI driver and select at runtime; etc.). |
Issues go stale after 90d of inactivity. If this issue is safe to close now please do so with Send feedback to sig-testing, kubernetes/test-infra and/or fejta. |
/remove-lifecycle stale |
Issues go stale after 90d of inactivity. If this issue is safe to close now please do so with Send feedback to sig-testing, kubernetes/test-infra and/or fejta. |
Stale issues rot after 30d of inactivity. If this issue is safe to close now please do so with Send feedback to sig-testing, kubernetes/test-infra and/or fejta. |
/lifecycle frozen |
The external-provisioner currently supports special key for specifying secret during volume provisioning. However, the https://kubernetes-csi.github.io/docs/secrets-and-credentials.html page does not document that.
So we should:
external-provisioner
and one forexternal-snapshotter
to document the "special keys" supported by both CSI volume and snapshot provisioning.@oleksiys maybe a good candidate to help with 2.
The text was updated successfully, but these errors were encountered: