-
Notifications
You must be signed in to change notification settings - Fork 6
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Keynames used for the secrets for Package Configuration Provider config instead of values #611
Comments
If the reason for this behaviour is that the same secret cannot actually be reused for two different workers, this is not documented, nor does the back-end indicate this in any way in logs. |
I'm very surprised that this is not always the case, also for the scanner. Is there maybe some config transformation or so configured for the scanner, that is not configured for the evaluator? |
Looks like the function that resolves |
That could explain why a literal |
I don't think so. This is DOS scanner config code, and for the DOS PCP, the config class is inlined to the same file as the implementation. We have been using the same configuration structure as given in the description of this issue for both plugins for a long time now, with no problems. |
I will prepare a fix. |
Thanks! This is our (almost) last hurdle in integrating our solution into ORT server, so let's hope the fix isn't too complicated. |
Resolve the secrets in the configurations of package configuration providers from the configured secret storage, instead of using the secret values directly. Fixes eclipse-apoapsis#611. Signed-off-by: Martin Nonnenmacher <[email protected]>
Resolve the secrets in the configurations of package configuration providers from the configured secret storage, instead of using the secret values directly. Fixes eclipse-apoapsis#611. Signed-off-by: Martin Nonnenmacher <[email protected]>
Resolve the secrets in the configurations of package configuration providers from the configured secret storage, instead of using the secret values directly. Fixes eclipse-apoapsis#611. Signed-off-by: Martin Nonnenmacher <[email protected]>
Resolve the secrets in the configurations of package configuration providers from the configured secret storage, instead of using the secret values directly. Fixes eclipse-apoapsis#611. Signed-off-by: Martin Nonnenmacher <[email protected]>
Resolve the secrets in the configurations of package configuration providers from the configured secret storage, instead of using the secret values directly. Fixes eclipse-apoapsis#611. Signed-off-by: Martin Nonnenmacher <[email protected]>
Resolve the secrets in the configurations of package configuration providers from the configured secret storage, instead of using the secret values directly. Fixes #611. Signed-off-by: Martin Nonnenmacher <[email protected]>
Thanks @mnonnenmacher nice work fixing this. We have successfully integrated both our scanner and package config provider into ORT server now. |
We are using the same secret
dosToken
for both DOS Scanner and DOS Package Configuration Provider to enable the plugins to communicate with DOS back-end. The secret is defined in Docker Compose insecrets/compose/secrets.properties
with (an example)The value of
dosToken
is used properly for DOS scanner, which is also verified from PostgresDB from the tablescanner_configuration_secrets
.But we have verified from our back-end that instead of the value of
dosToken
, the server tries to use a literal keydosToken
as the value, leading to communication failure with DOS back-end.The text was updated successfully, but these errors were encountered: