Skip to content

Drop secure.yaml warning and sample file#2864

Draft
ideaship wants to merge 1 commit intomainfrom
rl_drop_secure_yaml_warning
Draft

Drop secure.yaml warning and sample file#2864
ideaship wants to merge 1 commit intomainfrom
rl_drop_secure_yaml_warning

Conversation

@ideaship
Copy link
Copy Markdown
Contributor

@ideaship ideaship commented Apr 8, 2026

Users following the deployment guide see the warning "There is no file terraform/secure.yaml, create one by using terraform/secure.yaml.sample as template" in their log output. This is confusing because the guide recommends application credentials, where the secret is already in clouds.yaml and no secure.yaml is needed.

Remove the secure.yaml existence check from setup-testbed.py and delete terraform/secure.yaml.sample. The check was already non-fatal (warning + sleep, no exit) — a compromise from PR #1879 where it was noted that secure.yaml is optional for app credentials. A TODO to add smarter detection was left but never followed up on.

The deployment guide now exclusively recommends application credentials (osism/osism.github.io#972). For production deployments, a more fine-grained check that validates credentials based on auth type would still be valuable.

@ideaship ideaship force-pushed the rl_drop_secure_yaml_warning branch 2 times, most recently from b4deb34 to b1f0c4c Compare April 9, 2026 08:04
Users following the deployment guide see the warning "There is
no file terraform/secure.yaml, create one by using
terraform/secure.yaml.sample as template" in their log output.
This is confusing because the guide recommends application
credentials, where the secret is already in clouds.yaml and no
secure.yaml is needed.

Remove the secure.yaml existence check from setup-testbed.py
and delete terraform/secure.yaml.sample. The check was already
non-fatal (warning + sleep, no exit) — a compromise from PR
#1879 where it was noted that secure.yaml is optional for app
credentials. A TODO to add smarter detection was left but never
followed up on.

The deployment guide now exclusively recommends application
credentials (osism/osism.github.io#972). For production
deployments, a more fine-grained check that validates
credentials based on auth type would still be valuable.

AI-assisted: Claude Code
Signed-off-by: Roger Luethi <luethi@osism.tech>
@ideaship ideaship force-pushed the rl_drop_secure_yaml_warning branch from b1f0c4c to c06e94b Compare April 10, 2026 11:32
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant