-
Notifications
You must be signed in to change notification settings - Fork 89
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Merge pull request #267 from RedHatInsights/intercom-docs
Add docs for adding intercom keys
- Loading branch information
Showing
1 changed file
with
21 additions
and
0 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,21 @@ | ||
# Adding or Updating Intercom Keys in chrome-service | ||
|
||
## Overview | ||
|
||
Some teams wish to use Intercom Messenger for their apps and will need API secrets added. This requires adding the keys themselves into the vault and then exposing environment variables that point to them in `chrome-service`. | ||
|
||
## Adding secrets to the vault | ||
|
||
The secrets themselves will go in | ||
|
||
https://vault.devshift.net/ui/vault/secrets/insights/show/secrets/insights-dev/platform-experience-dev/chrome-service-backend | ||
|
||
typically with one for stage (denoted by the `_DEV` ending) and one for prod (without `_DEV`). These secret names will be added to `config.go` and `clowdapp.yml` below. | ||
|
||
## Updating chrome-service | ||
|
||
In `config.go`, you need to update `options.IntercomConfig` with the environment variable names and their corresponding secret names in the vault. In `clowdapp.yml`, you need to update `env` with the secret names that point to our `chrome-service-backend` in the vault. Also in the file, dummy secrets need to be added to `data` for CI/CD purposes (you can just copy the ones that are already provided). | ||
|
||
## Bumping the secrets version in app-interface | ||
|
||
Update [this line](https://gitlab.cee.redhat.com/service/app-interface/-/blob/master/data/services/insights/chrome-service/namespaces/chrome-service-stage.yml#L38) to update secrets in stage with the new secrets version (you may need to message someone if you don't have vault permissions to see file versioning). |