Skip to content

Commit 34b4160

Browse files
committed
Adding ADRs
1 parent 8e108c3 commit 34b4160

File tree

3 files changed

+56
-0
lines changed

3 files changed

+56
-0
lines changed

ADRs/coder.md

Lines changed: 19 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,19 @@
1+
2+
# Usage of Coder to facilitate terraform deployments
3+
4+
## Status
5+
6+
Accepted
7+
8+
## Context
9+
10+
The need for a Terraform automation/pipeline tool to facilitate Terraform deployments.
11+
12+
## Decision
13+
14+
We decided to use Coder for this. The alternative was to use our own Terraform pipeline implementation.
15+
16+
## Consequences
17+
18+
This removed the struggle to make the Terraform pipelines safe, the need for our own authentication service and also deployment became easier, as Coder supports Docker deployments.
19+

ADRs/ingress.md

Lines changed: 18 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,18 @@
1+
2+
# Kubernetes Ingress over Cilium
3+
4+
## Status
5+
6+
Accepted
7+
8+
## Context
9+
10+
In order to make our service public, we needed to use some networking framework to deploy it on a cluster.
11+
12+
## Decision
13+
14+
First choice was to use Cilium, but after multiple days of struggle we opted for an easier option - Kubernetes Ingress.
15+
16+
## Consequences
17+
18+
Both development and deployment became much smoother, as Ingress is less complicated and better documented.

ADRs/oidc.md

Lines changed: 19 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,19 @@
1+
2+
# Google OIDC for authentication
3+
4+
## Status
5+
6+
Accepted
7+
8+
## Context
9+
10+
To make a deployment of the OOD service possible, there needs to be some sort of (authentication)[https://osc.github.io/ood-documentation/latest/authentication.html]
11+
12+
## Decision
13+
14+
We decided to use Google OIDC, since its easy to setup and Google accounts are very popular.
15+
16+
## Consequences
17+
18+
Pros: easy to setup and manage auth user. Cons: no mapping with OpenStack, so will need to be replaced in the future with the same OIDC provider as is used in the OpenStack deployment.
19+

0 commit comments

Comments
 (0)