-
Notifications
You must be signed in to change notification settings - Fork 3.4k
cli,ci,ipsec: create key command and CI integration #37722
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I remember discussing (and tried to implement) this with @pchaigno during my on-boarding. IIRC, the outcome of the discussion was "It's a nice to have, but the burden of maintaining additional code might be heavier than the advantages brought".
Though, happy to re-consider this 😃
The code LGTM. We're not going to support all possible cases (ex looking here I also see a key 3 digest_null "" cipher_null ""
), right?
Oh, good question! |
These are used in our tests, but there could be more combination with different formats. |
I think my opinion didn't change, though I'm happy to discuss it and reconsider. My main question would be what problem do we aim to solve with this additional code? Any code we add will need maintenance, any abstraction will limit what users can do. Even if these inconveniences are small (as is likely the case here), we need to weight them against benefit(s). If the benefits are negligible (ex. the command looks nicer), then it's probably not worth it. |
I see your points, fair enough! My arguments are:
CC: @smagnani96 |
I'd like to provide users the easiest way to interact with Cilium.
In theory that's right, in practice I don't think we're using sorceries (
I remember once I received an error
Partially agree. Unfortunately, the commands to So the
The manual |
@pchaigno WDYT? |
I still remember copying and pasting commands too quickly, failing to notice error messages (such as However, My personal take is that we should incorporate the new CLI into all ipsec gh workflows as part of the pr, demonstrating that it is robust enough to handle our current use cases. Even if this can only help developers make less mistakes, I think it's of value. |
Is this a WIP? |
Yes, I've converted to the draft. |
This pull request has been automatically marked as stale because it |
188b46c
to
ec0c0c4
Compare
/ci-ipsec-e2e |
/ci-eks |
ec0c0c4
to
7df7ab8
Compare
@tamilmani1989 kind ping) |
Hey @cilium/azure, could you please review the PR. |
@cilium/azure (@tamilmani1989, @ungureanuvladvictor, @hemanthmalla, @tommyp1ckles), gentle ping. It would be great to move forward with this PR. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Looks, had a few points but they're minor. Approving to not hold this up anymore.
5d89eb0
to
8fa28bd
Compare
/test |
The commit adds IPsec key create sub-command in Cilium CLI. The intention is to use this command for encryption secret provisioning before the Cilium installation. Signed-off-by: viktor-kurchenko <viktor.kurchenko@isovalent.com>
The commit replaces bash scripts in CI with the Cilium CLI encrypt sub-commands. Signed-off-by: viktor-kurchenko <viktor.kurchenko@isovalent.com>
Signed-off-by: viktor-kurchenko <viktor.kurchenko@isovalent.com>
The commit fixes IPsec expected key calculation algorithm. Signed-off-by: viktor-kurchenko <viktor.kurchenko@isovalent.com>
The commit improves IPsec algorithm names. Signed-off-by: viktor-kurchenko <viktor.kurchenko@isovalent.com>
8fa28bd
to
fb67420
Compare
/test |
Please see per commit description.