-
Notifications
You must be signed in to change notification settings - Fork 1
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
GKEHubFeatureMembership with the private GitHub repo #120
Comments
Hi @fforloff, thanks for reaching out! Good point and good question! You are right, it's a chicken/egg situation :) In this page, that's what I would add to accomplish this:
I haven't tested this as-is yet, but that's pretty much close to what will work. If you have any feedback, please do let me know. Note: using the Connect Gateway Fleet feature ( I will soon update this workshop with that, and actually I want to move all the 6 GitHub repos to private (tracking this here), in order to continue showing security best practices. Thanks for the feedback/question, keep them coming! :) |
Thanks @mathieu-benoit. I'm trying to avoid as much manual steps as possible. So I think another option is to have the Cloud Source <-> GitHub sync happening, so that I can use the IAM GSA/KSA to access the Cloud Source copy of the code instead. |
So that worked beautifully I made the config controller SA a source.admin:
Then I added to the equivalent of your host repo
Then in the equivalent of the tenant repo:
and
|
BTW, thanks for the Connect Gateway hint - it helped me with my other issue, where I could not access the cluster from the coronet, since the endpoint was an IP address, not the FQDN. |
Yep, And yes, Connect Gateway is not very well known, but very powerful! :) |
@mathieu-benoit , setting up configSync via the GKEHubFeatureMembership works great if the GitHub repo is public, however I can't figure out how it can be done for the private repo. Setting secretType to ssh expects the git-creds secret in the config-management-system namespace of the newly provisioned cluster. Isn't it a chicken/egg situation?
The text was updated successfully, but these errors were encountered: