Movatterモバイル変換


[0]ホーム

URL:


Skip to content

Navigation Menu

Sign in
Appearance settings

Search code, repositories, users, issues, pull requests...

Provide feedback

We read every piece of feedback, and take your input very seriously.

Saved searches

Use saved searches to filter your results more quickly

Sign up
Appearance settings

feat: add --key flag to provisionerd start#14002

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to ourterms of service andprivacy statement. We’ll occasionally send you account related emails.

Already on GitHub?Sign in to your account

Merged
f0ssel merged 7 commits intomainfromf0ssel/provisionerd-key
Jul 25, 2024
Merged

Conversation

@f0ssel
Copy link
Contributor

@f0sself0ssel commentedJul 24, 2024
edited
Loading

What this changes:

  • Adds--key flag tocoder provisionerd start for providing a provisioner key to authenticate with.
    • Not allowed to specify--tag or--psk when using--key flag.

@f0sself0sselforce-pushed thef0ssel/provisionerd-key branch from5d4cbc0 to47aa9c4CompareJuly 25, 2024 15:48
@f0sself0ssel marked this pull request as ready for reviewJuly 25, 2024 16:12
@f0sself0ssel requested a review fromEmyrkJuly 25, 2024 18:29
Comment on lines +160 to +164
ifprovisionerKey!="" {
logger.Info(ctx,"provisioner key auth automatically sets tag "+provisionersdk.TagScope+" empty")
// no scope tag will default to org scope
delete(tags,provisionersdk.TagScope)
}
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others.Learn more.

Is this because it's all done on coderd? And we should be passing no tags into the provisioner daemon?

Copy link
ContributorAuthor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others.Learn more.

Correct, the API will actually fail if you pass any tags + a provisioner key. I felt this was a good opportunity to break that behavior altogether.

// If using PSK auth, the daemon is, by definition, scoped to the organization.
tags=provisionersdk.MutateTags(uuid.Nil,tags)
returntags,nil
iftags!=nil&&!maps.Equal(tags,map[string]string{}) {
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others.Learn more.

TILmaps.Equal

@f0sself0ssel merged commit2279441 intomainJul 25, 2024
@f0sself0ssel deleted the f0ssel/provisionerd-key branchJuly 25, 2024 19:26
@github-actionsgithub-actionsbot locked and limited conversation to collaboratorsJul 25, 2024
Sign up for freeto subscribe to this conversation on GitHub. Already have an account?Sign in.

Reviewers

@EmyrkEmyrkEmyrk approved these changes

Assignees

@f0sself0ssel

Labels

None yet

Projects

None yet

Milestone

No milestone

Development

Successfully merging this pull request may close these issues.

3 participants

@f0ssel@Emyrk

[8]ページ先頭

©2009-2025 Movatter.jp