Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Harmonize CES registry keys #39

Open
ppxl opened this issue Mar 30, 2020 · 1 comment
Open

Harmonize CES registry keys #39

ppxl opened this issue Mar 30, 2020 · 1 comment

Comments

@ppxl
Copy link
Member

ppxl commented Mar 30, 2020

There are some CES registry keys that do not adhere to the standardized registry naming scheme (that is: snake_case). Please harmonize the existing registry keys to the naming scheme:

  • nexus.repository.sandbox.enable
  • installDefaultDockerRegistry
  • disableOutreachManagement

I suggest these new keys:

  • enable_repository_sandbox
  • install_default_docker_registry
  • disable_outreach_management

The migration phase is going to take a while, presumely 1 year. During this phase both old keys and new keys are supported. Conflicts are resolved by copying the old key (if existent) to the new key. Then the old key is going to be deleted, with the new key being actively used.

After one year and rising log warnings, the support for old keys should be dropped. A separate issue should be opened for dropping the support.

ppxl added a commit that referenced this issue Mar 31, 2020
ppxl added a commit that referenced this issue Mar 31, 2020
With ways of bash. Please note this is still not sufficient for empty string
values from the registry. This is because doguctl cannot set empty string values
for any given key.
@ppxl
Copy link
Member Author

ppxl commented Apr 1, 2020

There is so much space for errors, migration of registry keys should actually be highly testable. I suggest it to be a https://github.com/cloudogu/doguctl feature.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant