**What**
- Update the documentation about secret management to note the changed
file location
- Remove the documentation on secret rotation, because this will not
currently work
- Update apikey-secret and ApiKeyProtected-Secrets to read secret values
from both the old and the new locations
**Why**
- Recent updates to faas-swarm and faas-netes changed the mount location
of secrets. These changes update the docs to reflect this change.
Signed-off-by: Lucas Roesler <roesler.lucas@gmail.com>
This updates fwatchdog to latest version (0.7.9) in all templates
in sample-functions and faas version in the documentation
Signed-off-by: Ivana Yovcheva (VMware) <iyovcheva@vmware.com>
This commit bumps the non-arm gateway from 0.7.0 to 0.7.1 and the arm
variants from 0.6.9 to 0.7.0.
It also updates all watchdog versions to the 0.7.1 release.
Signed-off-by: John McCabe <john@johnmccabe.net>
**What**
- Add a description for the secret key to the api swagger spec.
- Remove optional examples from the secret management guide.
- Update the ApiKeyProtected README to point at the new guide.
- Refactor the `makeSpec` function to accept the already assembled secrets
array because this should be easier to unit test.
Signed-off-by: Lucas Roesler <lucas.roesler@gmail.com>
**What**
- Add the ability to specify secrets as a csv
- Vendor the docker/cli/opts
- Update the guide for secrets to use the `faas-cli`
**Why**
- Allowing the csv specification of secrets gives users more control about how
those secrets are mounted into the container. This is good for things like
key rotation and for developers that are building on top of OpenFaaS.
Signed-off-by: Lucas Roesler <lucas.roesler@gmail.com>
**What**
- During function creation, accept an array of strings defining swarm secrets
that are required for the service
- Update docs
- Add new guide on using the secrets capability
- Add new sample function to highlight using environment variables
- Update `ApiKeyProtected` sample function to utilize the new secrets
capabilities
**Why**
- This allows secrets to remain encrypted at rest instead of being unencrypted
in environment variables and yaml files.
Fixes#285
Signed-off-by: Lucas Roesler <lucas.roesler@gmail.com>