-
Notifications
You must be signed in to change notification settings - Fork 27
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Unauthorized error should cause containers to quit or (better) re-read authentication information #358
Comments
In some cases token might get updated, but to re-read it we need to restart container. In future we need to implement re-read of token only. Improves kernelci#358 Signed-off-by: Denys Fedoryshchenko <denys.f@collabora.com>
In some cases token might get updated, but to re-read it we need to restart container. In future we need to implement re-read of token only. Improves kernelci#358 Signed-off-by: Denys Fedoryshchenko <denys.f@collabora.com>
In principle, when something like a token is revoked or replaced, then a production redeployment should happen to enable the new configuration. Then the services would be restarted. I think this is just one of the many corner-cases where something can go wrong but isn't part of the normal workflow. |
One solution is to restart all the services whenever |
@nuclearcat One solution is to monitor |
In some cases token might get updated in k8s or docker container, but in current case we have following problem:
trigger process keep failing on Unauthorized, but not rereading token, staying non-functional.
The text was updated successfully, but these errors were encountered: