Implement rolling updates of config/secrets directly on services #9
Labels
No labels
availability
bug
deployment-usability
duplicate
enhancement
help-wanted
question
security
stack-auth
stack-chat
stack-cleanup
stack-git
stack-mesh
stack-site-support
wontfix
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference: python-support/python-support-infra#9
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Currently we stop/start stacks to perform updates of configs/secrets. This is bad :)
With a little information-gathering, I'm certain we can prevent actually stopping stacks on deploy and instead only do the secret rotation as described in the Docker documentation: https://docs.docker.com/engine/swarm/secrets/#example-rotate-a-secret
rolling_updates
in thedocker_config
ansible module.That would also allow us to make use of built-in rolling config/secret update strategies in the
deploy:
section of the Compose specification.NOTE: The rclone volume stuff is always gonna need manual stop/start. Is jank. Such is life. Best we can do is make working with this more ergonomic in our playbooks.
.password-store
w/minimal-attack-surface Secrets Collaboration #18Closing as duplicate of #23.