-
Notifications
You must be signed in to change notification settings - Fork 20
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[common]: Enable mounting of existing secrets #148
[common]: Enable mounting of existing secrets #148
Conversation
… existing ressources
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Thank you for your pull request @wthhub
Sorry for my late answer. I was a little bit confused about the "existing" flag.
There are a couple of similar functions available. Have you considered whether components.[*].controller.envFrom.secretRef
,components.[*].controller.containers.[*].envFrom.secretRef
or components.[*].controller.containers.[*].configFiles
fits your usecase?
What do you think abourt the _files.yaml
template? I guess it is saver to exclude existing secrets and configMaps somewhere around line 9. Unless .filePath
is not set, everything should work anyway.
Sorry, that I did not realize this when I did the review for #147.
I added notices to two more comment lines.
Since I tested both types and optional flag I can confirm that the basic functionally is given with your change.
@fanks4, thanks for your review! The requirement is that the files can be mounted as files, so the options as environment variables are not applicable. The |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Thank you for the explanations and your changes @wthhub.
I guess it's acceptable to let the user decide whether a secret should be generated or not.
If not filePath
must not be set.
opened an internal follow up task to clearify this |
What this PR does:
Enable mounting of existing secrets and enable optional flag when mounting an existing ressources.
https://kubernetes.io/docs/concepts/configuration/secret/#restriction-secret-must-exist
Notes for Reviewer:
mostly copied from: #147
Checklist:
[chart]: Changed Something
README.md.gotmpl
file and executedhelm-docs